vulnerability
Red Hat OpenShift: CVE-2021-3156: sudo: Heap buffer overflow in argument parsing
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 01/26/2021 | 03/12/2021 | 04/11/2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
01/26/2021
Added
03/12/2021
Modified
04/11/2025
Description
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
Solution
linuxrpm-upgrade-redhat-coreos
References
- CVE-2021-3156
- https://attackerkb.com/topics/CVE-2021-3156
- REDHAT-RHSA-2021:0218
- REDHAT-RHSA-2021:0219
- REDHAT-RHSA-2021:0220
- REDHAT-RHSA-2021:0221
- REDHAT-RHSA-2021:0222
- REDHAT-RHSA-2021:0223
- REDHAT-RHSA-2021:0224
- REDHAT-RHSA-2021:0225
- REDHAT-RHSA-2021:0226
- REDHAT-RHSA-2021:0227
- REDHAT-RHSA-2021:0395
- REDHAT-RHSA-2021:0401

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.