Re: CVE-2021-3156 (Heap-Based Buffer Overflow in Sudo)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



I agree it should be a message. I'm curious though, about how often you
update on the server side? By the time I got the announcement the core repo
had pushed that version to me already.

On Fri, Jan 29, 2021 at 12:26 PM Łukasz Michalski via arch-general <
arch-general@xxxxxxxxxxxxxxxxxxx> wrote:

> Hi,
>
> Just checked my servers and all were vulnerable:
>
> [zork@archdevel ~]$ sudoedit -s '\' `perl -e 'print "A" x 65536'`
> malloc(): corrupted top size
> Aborted (core dumped)
>
> Updating to the latest version (sudo-1.9.5.p2-1) closed this
> vulnerability. Maybe this should be posted as arch news message?
>
> Regards,
> Łukasz
>




[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux