Tag: cve-2021-3156

A new sudo package with the CVE-2021-3156 fix within CloudLinux 6 Extended Lifecycle Support has been rolled out to 100%

Extended-CL

A new sudo package with the CVE-2021-3156 fix within CloudLinux 6 extended lifecycle support has been rolled out to 100% and is now available for download from our production repository.

Changelog

sudo-1.8.6p3-30.cloudlinux.els6

  • Fixed Heap-based buffer overflow in Sudo (CVE-2021-3156)

Update command

yum update sudo*

CVE-2021-3156 description

Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

A new sudo package with the CVE-2021-3156 fix within CentOS 6 Extended Lifecycle Support has been rolled out to 100%

Extended-CentOS

A new sudo package with the CVE-2021-3156 fix within CentOS 6 extended lifecycle support has been rolled out to 100% and is now available for download from our production repository.

A new sudo package with the CVE-2021-3156 fix for CloudLinux 7 and CloudLinux 8 released

update

A new sudo package with the CVE-2021-3156 fix for CloudLinux 7 and CloudLinux 8 is now available for download from our production repository.

A new sudo package with the CVE-2021-3156 fix within CentOS 6 Extended Lifecycle Support has been scheduled for gradual rollout

Extended-CentOS

A new sudo package with the CVE-2021-3156 fix within CentOS 6 extended lifecycle support has been scheduled for gradual rollout from our production repository.

A new sudo package with the CVE-2021-3156 fix within CloudLinux 6 Extended Lifecycle Support has been scheduled for gradual rollout

Extended-CL

A new sudo package with the CVE-2021-3156 fix within CloudLinux 6 extended lifecycle support has been scheduled for gradual rollout from our production repository.

Rollout slot: 4

Rolled out to: 1%

ETA for 100% rollout: February, 10

Changelog

sudo-1.8.6p3-30.cloudlinux.els6

  • Fixed Heap-based buffer overflow in Sudo (CVE-2021-3156)

Update command

yum update sudo*

Immediate update (via bypass)

yum update sudo* --enablerepo=cloudlinux-rollout-4-bypass

CVE-2021-3156 description

Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

imunify-logo

WEB SERVER SECURITY BLOG

Subscribe to CloudLinux Newsletter