Re: [arch-general] CVE-2021-3156 (Heap-Based Buffer Overflow in Sudo)

2021-01-29 Thread Jaron Kent-Dobias via arch-general
On Friday, 29 January 2021 at 18:20 (+0100), Łukasz Michalski via arch-general wrote: > Maybe this should be posted as arch news message? There was an announcement on the security list, attached. Jaron --- Begin Message --- Arch Linux Security Advisory ASA-202101-25 =

Re: [arch-general] CVE-2021-3156 (Heap-Based Buffer Overflow in Sudo)

2021-01-29 Thread Georg via arch-general
Am 29.01.2021 18:20, schrieb Łukasz Michalski via arch-general: Hi, Just checked my servers and all were vulnerable: [zork@archdevel ~]$ sudoedit -s '\' `perl -e 'print "A" x 65536'` malloc(): corrupted top size Aborted (core dumped) Updating to the latest version (sudo-1.9.5.p2-1) closed this

Re: [arch-general] CVE-2021-3156 (Heap-Based Buffer Overflow in Sudo)

2021-01-29 Thread David Rosenstrauch via arch-general
On 1/29/21 12:20 PM, Łukasz Michalski via arch-general wrote: Hi, Just checked my servers and all were vulnerable: Updating to the latest version (sudo-1.9.5.p2-1) closed this vulnerability. Maybe this should be posted as arch news message? It was already sent to the arch-security mailin

Re: [arch-general] CVE-2021-3156 (Heap-Based Buffer Overflow in Sudo)

2021-01-29 Thread Matt Compton via arch-general
I agree it should be a message. I'm curious though, about how often you update on the server side? By the time I got the announcement the core repo had pushed that version to me already. On Fri, Jan 29, 2021 at 12:26 PM Łukasz Michalski via arch-general < arch-general@lists.archlinux.org> wrote:

[arch-general] CVE-2021-3156 (Heap-Based Buffer Overflow in Sudo)

2021-01-29 Thread Łukasz Michalski via arch-general
Hi, Just checked my servers and all were vulnerable: [zork@archdevel ~]$ sudoedit -s '\' `perl -e 'print "A" x 65536'` malloc(): corrupted top size Aborted (core dumped) Updating to the latest version (sudo-1.9.5.p2-1) closed this vulnerability. Maybe this should be posted as arch news message