Sudo upgrade the micro-application immediately

A major security hole affecting the Linux ecosystem has been patched since last night in Sudo, a which allows administrators to grant restricted root access to others .

The vulnerability, which has as its identifier the CVE-2021-3156, better known as "Baron Samedit", was discovered by security company Qualys two weeks ago. Fixed last night with the release of Sudo v1.9.5p2 (update immediately).

In a simple explanation provided by του Sudo, το σφάλμα Baron Samedit μπορεί να αξιοποιηθεί από έναν εισβολέα που έχει αποκτήσει πρόσβαση σε έναν λογαριασμό με χαμηλά προνόμια για να αποκτήσει πρόσβαση root, ακόμα και αν ο not listed in /etc/sudoers – a configuration file that controls which users are allowed access to the su or sudo commands.

For technical details see reference Qualys or the video below.

While two other Sudo security vulnerabilities have been uncovered in the last two years, the error being uncovered today is far more dangerous.

The two previous bugs, CVE-2019-14287 and CVE-2019-18634, were difficult to exploit because they required complex and non-standard in sudo.

Things are different for the bug revealed today, because it affects all Sudo installations where there are sudoers (/ etc / sudoers) - which is usually found on most default Linux installations - Sudo.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).