{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-42465","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-11-04T21:08:25.980Z","dateReserved":"2023-09-11T00:00:00.000Z","datePublished":"2023-12-22T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-02-18T03:06:16.859Z"},"descriptions":[{"lang":"en","value":"Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.sudo.ws/releases/changelog/"},{"url":"https://www.openwall.com/lists/oss-security/2023/12/21/9"},{"url":"https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f"},{"url":"https://arxiv.org/abs/2309.02545"},{"url":"https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_15"},{"name":"GLSA-202401-29","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202401-29"},{"name":"FEDORA-2024-cdccda4f62","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6XMRUJCPII4MPWG43HTYR76DGLEYEFZ/"},{"url":"https://security.netapp.com/advisory/ntap-20240208-0002/"},{"name":"FEDORA-2024-6fa5af9ea8","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R4Q23NHCKCLFIHSNY6KJ27GM7FSCEVXM/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://www.sudo.ws/releases/changelog/","tags":["x_transferred"]},{"url":"https://www.openwall.com/lists/oss-security/2023/12/21/9","tags":["x_transferred"]},{"url":"https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f","tags":["x_transferred"]},{"url":"https://arxiv.org/abs/2309.02545","tags":["x_transferred"]},{"url":"https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_15","tags":["x_transferred"]},{"name":"GLSA-202401-29","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202401-29"},{"name":"FEDORA-2024-cdccda4f62","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6XMRUJCPII4MPWG43HTYR76DGLEYEFZ/"},{"url":"https://security.netapp.com/advisory/ntap-20240208-0002/","tags":["x_transferred"]},{"name":"FEDORA-2024-6fa5af9ea8","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R4Q23NHCKCLFIHSNY6KJ27GM7FSCEVXM/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R4Q23NHCKCLFIHSNY6KJ27GM7FSCEVXM/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6XMRUJCPII4MPWG43HTYR76DGLEYEFZ/"},{"url":"http://www.openwall.com/lists/oss-security/2025/09/23/2"},{"url":"http://www.openwall.com/lists/oss-security/2025/09/24/6"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T21:08:25.980Z"}}]}}