Re: CVE-2021-3156 (Heap-Based Buffer Overflow in Sudo)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Am 29.01.2021 18:20, schrieb Łukasz Michalski via arch-general:
Hi,

Just checked my servers and all were vulnerable:

[zork@archdevel ~]$ sudoedit -s '\' `perl -e 'print "A" x 65536'`
malloc(): corrupted top size
Aborted (core dumped)

Updating to the latest version (sudo-1.9.5.p2-1) closed this
vulnerability. Maybe this should be posted as arch news message?

Regards,
Łukasz

There has been an ASA on arch-security [0] on top of huge press coverage, that should suffice.

[0] https://lists.archlinux.org/pipermail/arch-security/2021-January/001699.html



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux