<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=4088&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Sudo Vulnerability CVE-2021-3156]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=4088</link>
		<description><![CDATA[The most recent posts in Sudo Vulnerability CVE-2021-3156.]]></description>
		<lastBuildDate>Sun, 17 Apr 2022 10:00:26 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=35637#p35637</link>
			<description><![CDATA[<p>I was suspicious and not surprised. <br />I don&#039;t really have this issue anymore, I don&#039;t install proprietary Nvidea drivers anymore but I&#039;ve since smartened up. </p><p>But Nvidea drivers the screen would flash. <br />I uninstall sudo, install Nvidea driver and it didn&#039;t flash the screen. <br />Nvidea must of known about some way to exploit sudo. I couldn&#039;t say why or what happened but I was suspicious.</p>]]></description>
			<author><![CDATA[dummy@example.com (czeekaj)]]></author>
			<pubDate>Sun, 17 Apr 2022 10:00:26 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=35637#p35637</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31935#p31935</link>
			<description><![CDATA[<p>you can also program in completions for doas if you are so inclined. </p><p>a few examples i found here <a href="https://git.xosc.org/config/tree/.kshrc" rel="nofollow">https://git.xosc.org/config/tree/.kshrc</a></p><div class="codebox"><pre class="vscroll"><code>#############################################################################
# COMPLETIONS
#############################################################################

# Mostly copied from
# https://github.com/qbit/dotfiles/blob/master/common/dot_ksh_completions

if [ -d ~/.password-store ]; then
	PASS_LIST=$(
		cd ~/.password-store
		find . -type f -name \*.gpg | sed &#039;s/^\.\///&#039; | sed &#039;s/\.gpg$//g&#039;
	)

	set -A complete_tpm_1 -- $PASS_LIST usage
	set -A complete_tpm_2 -- $PASS_LIST edit insert show rm
fi

set -A complete_kill_1 -- -9 -HUP -INFO -KILL -TERM

set -A complete_ifconfig_1 -- $(ifconfig | grep ^[a-z] | cut -d: -f1)

if [ -d /var/db/pkg ]; then
	PKG_LIST=$(/bin/ls -1 /var/db/pkg)
	set -A complete_pkg_info -- $PKG_LIST

	alias dpkgdel=&quot;doas pkg_delete&quot;
	set -A complete_dpkgdel_1 -- $PKG_LIST
fi

# relayctl completion.  Second level only for &#039;show&#039;
set -A complete_relayctl_1 -- monitor show load poll reload stop redirect table host log
set -A complete_relayctl_2 -- summary hosts redirects relays routers sessions

set -A complete_unwindctl_1 -- reload log status

if [ -d /etc/rc.d ]; then
	RCD_LIST=$(/bin/ls /etc/rc.d)
	set -A complete_rcctl_1 -- get getdef set check reload restart stop start disable enable order ls
	set -A complete_rcctl_2 -- $RCD_LIST

	alias drcctl=&quot;doas rcctl&quot;
	set -A complete_drcctl_1 -- get getdef set check reload restart stop start disable enable order ls
	set -A complete_drcctl_2 -- $RCD_LIST
fi

set -A complete_tarsnap_1 -- --list-archives --print-stats --fsck --fsck-prune --nuke --verify-config --version --checkpoint-bytes --configfile --dry-run --exclude --humanize-numbers --keyfile --totals

# /tmp/.man-list is generated upon boot by /etc/rc.local with
# find /usr/share/man/ -type f | sed -e &#039;s/.*\///&#039; -e &#039;s/\.[0-9]//&#039; | sort -u
[[ -f /tmp/.man-list ]] &amp;&amp; set -A complete_man -- $(cat /tmp/.man-list)

[[ -d $HOME/.marks ]] &amp;&amp; set -A complete_j -- $(/bin/ls $HOME/.marks)</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (hevidevi)]]></author>
			<pubDate>Thu, 07 Oct 2021 13:03:46 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31935#p31935</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31930#p31930</link>
			<description><![CDATA[<div class="quotebox"><blockquote><div><p>My bad. I used the command wrong.</p></div></blockquote></div><p>Thanks for letting me know, I thought I must be doing something wrong... But, good to know.</p><p>ahahaha. relief!</p>]]></description>
			<author><![CDATA[dummy@example.com (GlennW)]]></author>
			<pubDate>Thu, 07 Oct 2021 00:13:34 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31930#p31930</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31923#p31923</link>
			<description><![CDATA[<div class="quotebox"><cite>GlennW wrote:</cite><blockquote><div><p>Now I&#039;m confused. And I don&#039;t use sudo or would have it installed if I could arrange it.</p><p>Using the example above... I get</p><div class="codebox"><pre><code>glenn@asus-r552jv:~$ sudoedit -s /
usage: sudoedit [-AknS] [-r role] [-t type] [-C num] [-D directory] [-g group] [-h host] [-p prompt] [-R directory] [-T timeout] [-u user] file ...
glenn@asus-r552jv:~$</code></pre></div></div></blockquote></div><p>My bad. I used the command wrong. </p><div class="quotebox"><blockquote><div><p>~ % sudoedit -s/ <br />sudoedit: Ungültige Option -- /<br />usage: sudoedit [-AknS] [-r role] [-t type] [-C num] [-g group] [-h host] [-p<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; prompt] [-T timeout] [-u user] file ...</p></div></blockquote></div><p>I also get this</p><div class="quotebox"><blockquote><div><p>~ % sudoedit -s /<br />usage: sudoedit [-AknS] [-r role] [-t type] [-C num] [-g group] [-h host] [-p<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; prompt] [-T timeout] [-u user] file ...</p></div></blockquote></div><p>I will give doas a try.</p>]]></description>
			<author><![CDATA[dummy@example.com (superurmel)]]></author>
			<pubDate>Wed, 06 Oct 2021 05:18:05 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31923#p31923</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31919#p31919</link>
			<description><![CDATA[<p>Oho, just discovered that:</p><div class="quotebox"><blockquote><div><p>doas -s</p></div></blockquote></div><p>is a handy workaround while persist is not working.</p><p>I&#039;ve uninstalled sudo.&#160; (There were no dependencies in my installation.)</p>]]></description>
			<author><![CDATA[dummy@example.com (dvnUsr)]]></author>
			<pubDate>Wed, 06 Oct 2021 00:42:12 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31919#p31919</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31917#p31917</link>
			<description><![CDATA[<p>@H_O_A_S/@zapper:&#160; Thanks for the tip about doas.</p><p>I note it can be installed from the repository (http://deb.devuan.org/merged chimaera/main amd64 Packages).</p><p>Tried it, but the one thing I need is its &quot;persist&quot; functionality, which doesn&#039;t work for me; here&#039;s my /etc/doas.conf contents:</p><div class="quotebox"><blockquote><div><p>permit persist &lt;my-username&gt; as root</p></div></blockquote></div><p>doas runs fine but *always* asks me for the password.</p><p>I understand persist doesn&#039;t work because the package must have been compiled without first enabling persist.&#160; I assume it comes directly from Debian ... <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983505" rel="nofollow">https://bugs.debian.org/cgi-bin/bugrepo … bug=983505</a></p>]]></description>
			<author><![CDATA[dummy@example.com (dvnUsr)]]></author>
			<pubDate>Tue, 05 Oct 2021 23:24:51 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31917#p31917</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31915#p31915</link>
			<description><![CDATA[<p>Now I&#039;m confused. And I don&#039;t use sudo or would have it installed if I could arrange it.</p><p>Using the example above... I get</p><div class="codebox"><pre><code>glenn@asus-r552jv:~$ sudoedit -s /
usage: sudoedit [-AknS] [-r role] [-t type] [-C num] [-D directory] [-g group] [-h host] [-p prompt] [-R directory] [-T timeout] [-u user] file ...
glenn@asus-r552jv:~$</code></pre></div><p>But checking with apt install... I get</p><div class="codebox"><pre><code>root@asus-r552jv:~# apt install sudo
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
sudo is already the newest version (1.9.5p2-3).
sudo set to manually installed.</code></pre></div><p>I&#039;d get rid of it (sudo), but it is tied to too many other programs...</p><div class="codebox"><pre><code>root@asus-r552jv:~# apt remove sudo
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following packages were automatically installed and are no longer required:
  bluedevil breeze-gtk-theme bup bup-doc gtk2-engines-pixbuf ibus-data ieee-data kde-cli-tools-data kde-config-gtk-style kde-config-sddm kde-style-oxygen-qt5 kgamma5
  khotkeys khotkeys-data kinfocenter kmenuedit ksysguard ksysguard-data kup-backup kwrited libgsettings-qt1 libibus-1.0-5 libkf5su-data libkf5sysguard-bin
  libkpmcore11 libksignalplotter9 liboxygenstyle5-5 liboxygenstyleconfig5-5 libqt5sensors5 libscim8v5 libxcb-record0 oxygen-sounds par2 partitionmanager
  plasma-desktop-data plasma-disks plasma-pa pulseaudio-module-gsettings python3-fuse python3-pylibacl python3-tornado qml-module-gsettings1.0
  qml-module-org-kde-activities qml-module-org-kde-kcm qml-module-org-kde-kio qml-module-org-kde-kitemmodels smartmontools systemsettings xsettingsd
Use &#039;apt autoremove&#039; to remove them.
The following packages will be REMOVED:
  kde-cli-tools kde-plasma-desktop kscreen libkf5su-bin libkf5su5 plasma-desktop sudo
0 upgraded, 0 newly installed, 7 to remove and 3 not upgraded.
After this operation, 12.4 MB disk space will be freed.
Do you want to continue? [Y/n] n
Abort.</code></pre></div><p>That &quot;apt autoremove&quot; list is for after sudo is removed.</p><p>Anyhow... I still won&#039;t use it. I&#039;m sure I removed the config files from /etc/...</p>]]></description>
			<author><![CDATA[dummy@example.com (GlennW)]]></author>
			<pubDate>Tue, 05 Oct 2021 21:01:47 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31915#p31915</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31897#p31897</link>
			<description><![CDATA[<p>Thanks for the reply GlennW</p><div class="quotebox"><blockquote><div><p>hope this helps.</p></div></blockquote></div><p>It still confuses me. I thought that, because I&#039;m on stable, I should get security patches.</p><p>As I have sudo version 1.8.27-1+deb10u3, I think I still have the vulnerable version.</p><div class="quotebox"><blockquote><div><p>Affected version<br />sudo: 1.8.2 – 1.8.31p2<br />sudo: 1.9.0 – 1.9.5p1</p></div></blockquote></div><p>I&#039;m confused <img src="https://dev1galaxy.org/img/smilies/hmm.png" width="15" height="15" alt="hmm" /></p><p>SOLVED:</p><p>Ok, after a little search on debian.org if found out that the version I have (1.8.27-1+deb10u3) is fixed!</p><p>I have the fixed version (<a href="https://www.debian.org/security/2021/dsa-4839" rel="nofollow">https://www.debian.org/security/2021/dsa-4839</a>) but still the behavior described on <a href="https://haxf4rall.com/2021/01/27/cve-2021-3156-sudo-heap-based-buffer-overflow-vulnerability-alert/" rel="nofollow">https://haxf4rall.com/2021/01/27/cve-20 … ity-alert/</a>.</p><div class="quotebox"><blockquote><div><p>How to exploit this bug</p><p>Log in to the system as a non-root user and use the command sudoedit -s /</p><p>&#160; &#160; -If you see an error that starts with sudoedit:, it indicates that there is a vulnerability.<br />&#160; &#160; -If you see an error starting with usage:, then the patch has taken effect.</p></div></blockquote></div>]]></description>
			<author><![CDATA[dummy@example.com (superurmel)]]></author>
			<pubDate>Tue, 05 Oct 2021 10:20:49 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31897#p31897</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31896#p31896</link>
			<description><![CDATA[<p>ah, It&#039;s in testing and daedalus&#160; 1.9.5p2-3 amd64 [installed,automatic]</p><div class="codebox"><pre><code>glenn@asus-r552jv:~$ su
Password: 
root@asus-r552jv:~# apt list sudo -a
Listing... Done
sudo/testing,testing,daedalus,now 1.9.5p2-3 amd64 [installed,automatic]
sudo/stable 1.8.27-1+deb10u3 amd64

root@asus-r552jv:~# </code></pre></div><p>hope this helps.</p>]]></description>
			<author><![CDATA[dummy@example.com (GlennW)]]></author>
			<pubDate>Tue, 05 Oct 2021 10:00:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31896#p31896</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=31895#p31895</link>
			<description><![CDATA[<div class="quotebox"><cite>dice wrote:</cite><blockquote><div><p>if you havent apt updated in a while today would be the day to do it if you use sudo.</p></div></blockquote></div><div class="quotebox"><blockquote><div><p>Affected version<br />sudo: 1.8.2 – 1.8.31p2<br />sudo: 1.9.0 – 1.9.5p1</p><p>Solution<br />In this regard, we recommend that users upgrade sudo to the latest version in time.</p></div></blockquote></div><p>Hi. I don&#039;t understand. I do check for updates regulary. My version von sudo is:</p><div class="codebox"><pre><code>~ % apt list sudo -a         
Auflistung... Fertig
sudo/stable,stable-security,now 1.8.27-1+deb10u3 amd64  [installiert]
sudo/stable,stable-security 1.8.27-1+deb10u3 i386</code></pre></div><p>And I&#039;m on Devuan 3.1.</p><p>My sources-list:</p><div class="codebox"><pre><code>## package repositories
deb http://deb.devuan.org/merged beowulf main contrib non-free
deb http://deb.devuan.org/merged beowulf-updates main contrib non-free
deb http://deb.devuan.org/merged beowulf-security main contrib non-free
deb http://deb.devuan.org/merged beowulf-backports main contrib non-free</code></pre></div><p>What is it I do not understand?<br />Do I something wroing?</p>]]></description>
			<author><![CDATA[dummy@example.com (superurmel)]]></author>
			<pubDate>Tue, 05 Oct 2021 09:55:59 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=31895#p31895</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=27115#p27115</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><div class="quotebox"><cite>zapper wrote:</cite><blockquote><div><p>when did get discovered?</p></div></blockquote></div><p>Yesterday.</p><p>EDIT: the fixed version is 6.8.1.</p><p>EDIT2: it looks like the doas package in Hyperbola is orphaned and stuck on an old version (6.6.1).</p></div></blockquote></div><p>Hmm, they are doing a lot of different packaging things for 0.4 release, so it may be taking a while.&#160; I hope 0.4 is ready soon.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Sat, 30 Jan 2021 10:05:58 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=27115#p27115</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=27106#p27106</link>
			<description><![CDATA[<div class="quotebox"><cite>zapper wrote:</cite><blockquote><div><p>when did get discovered?</p></div></blockquote></div><p>Yesterday.</p><p>EDIT: the fixed version is 6.8.1.</p><p>EDIT2: it looks like the doas package in Hyperbola is orphaned and stuck on an old version (6.6.1).</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Fri, 29 Jan 2021 21:49:48 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=27106#p27106</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=27103#p27103</link>
			<description><![CDATA[<div class="quotebox"><cite>yeti wrote:</cite><blockquote><div><div class="quotebox"><cite>zapper wrote:</cite><blockquote><div><p>On Hyperbola I use doas, surprised more distros within linux haven&#039;t started using it yet.</p></div></blockquote></div><p>Did you check it for having &quot;<a href="http://ix.io/2NC0" rel="nofollow">CVE-2019-25016 (Unsafe, incomplete PATH reset)</a>&quot; fixed?</p></div></blockquote></div><p>If I had to guess, I think Hyperbola has fixed that already...</p><p>But curiously, when did get discovered?</p><p>If it was a year or two ago, for sure.</p><p>by for sure, I mean its been solved most likely.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Fri, 29 Jan 2021 21:42:14 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=27103#p27103</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=27098#p27098</link>
			<description><![CDATA[<div class="quotebox"><cite>yeti wrote:</cite><blockquote><div><div class="quotebox"><cite>zapper wrote:</cite><blockquote><div><p>On Hyperbola I use doas, surprised more distros within linux haven&#039;t started using it yet.</p></div></blockquote></div><p>Did you check it for having &quot;<a href="http://ix.io/2NC0" rel="nofollow">CVE-2019-25016 (Unsafe, incomplete PATH reset)</a>&quot; fixed?</p></div></blockquote></div><p>Alpine Linux updated to v6.8.1 within an hour of the upstream release :-)</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Fri, 29 Jan 2021 18:23:38 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=27098#p27098</guid>
		</item>
		<item>
			<title><![CDATA[Re: Sudo Vulnerability CVE-2021-3156]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=27095#p27095</link>
			<description><![CDATA[<p>sudo is a sh*t that makes a linux box acts like a windo one! puff .. is has a larrge history of several security holes, i mean several security interestelar black holes.. in fact</p>]]></description>
			<author><![CDATA[dummy@example.com (mckaygerhard)]]></author>
			<pubDate>Fri, 29 Jan 2021 15:44:45 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=27095#p27095</guid>
		</item>
	</channel>
</rss>
