Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

How to fix CVE-2021-3156

Tags:

sudo

ubuntu

sudo before v1.9.5p2 has a Heap-based buffer overflow, allowing privilege escalation to root via sudoedit -s and a command-line argument that ends with a single backslash character.

I'm wondering if it is enough to run:

sudo apt update

on a Ubuntu server to fix CVE-2021-3156?

I've been doing some reading but I haven't found any concrete answer, I guess because it is a very recent issue.

Thanks you!

like image 988
Ricardo Linares Avatar asked Jan 27 '21 13:01

Ricardo Linares


2 Answers

You need to update APT's package list and then install the upgrade:

sudo apt-get update
sudo apt-get --only-upgrade install sudo
like image 156
Travis Warlick Avatar answered Oct 22 '22 00:10

Travis Warlick


Whether your system is vulnerable or not can be checked before and after a potential fix.

Just type into a non-root shell:

$ sudoedit -s /

Doing this before updating, if you get a response starting with sudoedit like:

sudoedit: /: not a regular file

your system is vulnerable and you are doing good to update sudo as advised by @Travis Warlick.

If you get a response, which should be the case after updating or you have a recent (1.9.5p2 or higher) or old enough (prior to 1.8.2) version already, like:

usage: sudoedit [-AknS] [-r role] ...

your system is not (anymore) vulnerable in relation to CVE-2021-3156.

Affected sudo versions from stock are:

  • 1.8.2 to 1.8.31p2
  • 1.9.0 to 1.9.5p1

Version 1.9.5p2 is save.

To check your version: $ sudo --version

Grabbed those informations from here.

like image 31
woodz Avatar answered Oct 21 '22 23:10

woodz