
On Wed, Jan 27, 2021 at 03:17:12PM +0100, Sebastian M. Ernst wrote:
Hi Marcus,
The sudo update was released today for 15.1.
just for clarification: If I just updated my system, I should have this patch running? This would be: sudo-1.8.22-lp151.5.12.1.x86_64 (dated January 27).
Yes. You can check: rpm -q --changelog sudo|head will list the new CVE.
The Qualys blog post on this issue ...
https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-he...
... states:
How can I test if I have vulnerable version?
To test if a system is vulnerable or not, login to the system as a non-root user.
Run command “sudoedit -s /”
If the system is vulnerable, it will respond with an error that starts with “sudoedit:”
If the system is patched, it will respond with an error that starts with “usage:”
Right now, I get this:
me@computer:~> sudoedit -s / sudoedit: invalid mode flags from sudo front end: 0x20002 sudoedit: Regelwerks-Plugin konnte nicht initialisiert werden
Is their "test" "broken" or is this kind of test not applicable to Leap?
try: sudoedit -s '\' `perl -e 'print "A" x 65536'` it will crash before, it should not crash after: BAD: malloc(): corrupted top size Aborted (core dumped) ciao, Marcus