[ASA-202101-25] sudo: multiple issues

Morten Linderud foxboron at archlinux.org
Tue Jan 26 20:14:29 UTC 2021


Arch Linux Security Advisory ASA-202101-25
==========================================

Severity: Critical
Date    : 2021-01-20
CVE-ID  : CVE-2021-3156 CVE-2021-23239
Package : sudo
Type    : multiple issues
Remote  : No
Link    : https://security.archlinux.org/AVG-1431

Summary
=======

The package sudo before version 1.9.5.p2-1 is vulnerable to multiple
issues including privilege escalation and information disclosure.

Resolution
==========

Upgrade to 1.9.5.p2-1.

# pacman -Syu "sudo>=1.9.5.p2-1"

The problems have been fixed upstream in version 1.9.5.p2.

Workaround
==========

None.

Description
===========

- CVE-2021-3156 (privilege escalation)

A serious heap-based buffer overflow has been discovered in sudo before
version 1.9.5p2 that is exploitable by any local user. It has been
given the name Baron Samedit by its discoverer. The bug can be
leveraged to elevate privileges to root, even if the user is not listed
in the sudoers file. User authentication is not required to exploit the
bug.

- CVE-2021-23239 (information disclosure)

A security issue was found in sudo before version 1.9.5. A race
condition in sudoedit could have allowed an attacker to test for the
existence of directories in arbitrary locations in the file system.

Impact
======

Any unprivileged user can escalate privileges, and a local attacker
could figure out file locations through a race condition.

References
==========

https://www.openwall.com/lists/oss-security/2021/01/11/2
https://www.sudo.ws/alerts/unescape_overflow.html
https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit
https://www.openwall.com/lists/oss-security/2021/01/26/3
https://www.sudo.ws/repos/sudo/rev/9b97f1787804
https://www.sudo.ws/repos/sudo/rev/a97dc92eae6b
https://www.sudo.ws/repos/sudo/rev/049ad90590be
https://www.sudo.ws/repos/sudo/rev/09f98816fc89
https://www.sudo.ws/repos/sudo/rev/c125fbe68783
https://www.sudo.ws/repos/sudo/rev/ea19d0073c02
https://security.archlinux.org/CVE-2021-3156
https://security.archlinux.org/CVE-2021-23239
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210126/b0478fcc/attachment.sig>


More information about the arch-security mailing list