Linux Security
    Linux Security
    Linux Security

    Slackware: 2021-026-01: sudo Security Update

    Date 26 Jan 2021
    Posted By LinuxSecurity Advisories
    New sudo packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
    Hash: SHA1
    [slackware-security]  sudo (SSA:2021-026-01)
    New sudo packages are available for Slackware 14.0, 14.1, 14.2, and -current to
    fix security issues.
    Here are the details from the Slackware 14.2 ChangeLog:
    patches/packages/sudo-1.9.5p2-i586-1_slack14.2.txz:  Upgraded.
      When invoked as sudoedit, the same set of command line options
      are now accepted as for "sudo -e". The -H and -P options are
      now rejected for sudoedit and "sudo -e" which matches the sudo
      1.7 behavior. This is part of the fix for CVE-2021-3156.
      Fixed a potential buffer overflow when unescaping backslashes
      in the command's arguments. Normally, sudo escapes special
      characters when running a command via a shell (sudo -s or sudo
      -i). However, it was also possible to run sudoedit with the -s
      or -i flags in which case no escaping had actually been done,
      making a buffer overflow possible. This fixes CVE-2021-3156.
      For more information, see:
      (* Security fix *)
    Where to find the new packages:
    Thanks to the friendly folks at the OSU Open Source Lab
    ( for donating FTP and rsync hosting
    to the Slackware project!  :-)
    Also see the "Get Slack" section on for
    additional mirror sites near you.
    Updated package for Slackware 14.0:
    Updated package for Slackware x86_64 14.0:
    Updated package for Slackware 14.1:
    Updated package for Slackware x86_64 14.1:
    Updated package for Slackware 14.2:
    Updated package for Slackware x86_64 14.2:
    Updated package for Slackware -current:
    Updated package for Slackware x86_64 -current:
    MD5 signatures:
    Slackware 14.0 package:
    047bb22ce157548126d16430c3a374ef  sudo-1.9.5p2-i486-1_slack14.0.txz
    Slackware x86_64 14.0 package:
    7fbd3e885d8cc9b3cee66cdefeeba9e3  sudo-1.9.5p2-x86_64-1_slack14.0.txz
    Slackware 14.1 package:
    261ca55be2533f11b224e806e1acd554  sudo-1.9.5p2-i486-1_slack14.1.txz
    Slackware x86_64 14.1 package:
    0a261cd2ba3aa541d294d69f4bed5c2f  sudo-1.9.5p2-x86_64-1_slack14.1.txz
    Slackware 14.2 package:
    00df3b1ea402b263fbf63bd411f99a77  sudo-1.9.5p2-i586-1_slack14.2.txz
    Slackware x86_64 14.2 package:
    4f29ad52ed440334c591ee530362e384  sudo-1.9.5p2-x86_64-1_slack14.2.txz
    Slackware -current package:
    90296d19fb80c3fab70158febfba1d54  ap/sudo-1.9.5p2-i586-1.txz
    Slackware x86_64 -current package:
    a3c31d280a60d4ea59922a60410072d9  ap/sudo-1.9.5p2-x86_64-1.txz
    Installation instructions:
    Upgrade the package as root:
    # upgradepkg sudo-1.9.5p2-i586-1_slack14.2.txz

    LinuxSecurity Poll

    Which is the best secure Linux distro for pentesting?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"174","title":"Kali Linux","votes":"9","type":"x","order":"1","pct":56.25,"resources":[]},{"id":"175","title":"Parrot OS","votes":"7","type":"x","order":"2","pct":43.75,"resources":[]},{"id":"176","title":"BlackArch Linux","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.