CVE-2021-3156

Issues related to applications and software problems
Post Reply
merem29
Posts: 2
Joined: 2021/09/29 20:32:01

CVE-2021-3156

Post by merem29 » 2021/09/29 20:38:21

i have centos 7 server and i want to install this packet . how i can install this packet on my server and which command i must use

Critical Sudo Vulnerability - CVE-2021-3156/Baron Samedit

thanks

User avatar
TrevorH
Site Admin
Posts: 33220
Joined: 2009/09/24 10:40:56
Location: Brighton, UK

Re: CVE-2021-3156

Post by TrevorH » 2021/09/29 20:41:43

That update is from January 2021 so if you are missing that then you are missing others too. Run yum update to get everything up to date. If the kernel or glibc or openssl and probably some other packages are also updated then you should reboot to activate the fixes. After the update you should see results like this

Code: Select all

[root@centos7 ~]# rpm -q sudo
sudo-1.8.23-10.el7_9.1.x86_64
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke

merem29
Posts: 2
Joined: 2021/09/29 20:32:01

Re: CVE-2021-3156

Post by merem29 » 2021/10/03 21:38:56

some applications are running on the server while centos is being updated. does it have an impact on them, how do you plan an update in such cases? in other words, how do you contact the software teams or applications and plan every time the update package is released. for example, this update is required for the OS, but I don't know how it affects the applications on them. how do you follow the path in these situations.
i want to take advantage of your experience

thanks

User avatar
TrevorH
Site Admin
Posts: 33220
Joined: 2009/09/24 10:40:56
Location: Brighton, UK

Re: CVE-2021-3156

Post by TrevorH » 2021/10/04 09:14:14

The whole point of RHEL and CentOS is that they really try very hard not to break things while also providing updates to keep you secure. Those updates do not do any good if they are not installed.
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke

User avatar
jlehtone
Posts: 4531
Joined: 2007/12/11 08:17:33
Location: Finland

Re: CVE-2021-3156

Post by jlehtone » 2021/10/04 09:37:23

I'm nice. I kill the users and reboot the machines in order to get every last bit of updates in use.
If I were not nice, then I would let users crash on old bugs or get hacked.

User avatar
TrevorH
Site Admin
Posts: 33220
Joined: 2009/09/24 10:40:56
Location: Brighton, UK

Re: CVE-2021-3156

Post by TrevorH » 2021/10/04 10:26:30

And the way that updates work is that yum replaces the files on disk but anything that already has them in use will continue to use the old version of the files until that process ends and is restarted.
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke

Post Reply