Patched sudo privilege escalation vulnerability CVE-2021-3156
A rather nasty sudo vulnerability has been making news for a couple of weeks now, apparently most of Unix and Unix-like operating systems were affected:
sudo package had heap-based buffer overflow, allowing any user on the system to use sudoedit -s command and become root.
sudo version with CVE-2021-3156 fixed
In most distributions, the updated sudo version is 1.9.5p2.
I have installed macOS update 11.2.1 yesterday that patched the version:
to the expected 1.9.5p2:
And also updated my CentOS 8 servers, expected version is sudo-1.8.29-6.el8_3.1
Stay safe!
See Also
- sudo command
- Official sudo website
- CVE-2021-3156
- What does sudo mean?
- Install sudo in Debian
- [macOS update 11.2.1][macos-sudo]
- macOS
- CentOS 8 released
A rather nasty sudo vulnerability has been making news for a couple of weeks now, apparently most of Unix and Unix-like operating systems were affected:
sudo package had heap-based buffer overflow, allowing any user on the system to use sudoedit -s command and become root.
sudo version with CVE-2021-3156 fixed
In most distributions, the updated sudo version is 1.9.5p2.
I have installed macOS update 11.2.1 yesterday that patched the version:
to the expected 1.9.5p2:
And also updated my CentOS 8 servers, expected version is sudo-1.8.29-6.el8_3.1
Stay safe!
See Also
- sudo command
- Official sudo website
- CVE-2021-3156
- What does sudo mean?
- Install sudo in Debian
- [macOS update 11.2.1][macos-sudo]
- macOS
- CentOS 8 released