{"id":21477,"date":"2021-02-01T21:08:50","date_gmt":"2021-02-01T20:08:50","guid":{"rendered":"https:\/\/www.linuxboxen.dk\/?page_id=21477"},"modified":"2021-02-01T21:08:50","modified_gmt":"2021-02-01T20:08:50","slug":"10-aar-gammel-fejl-i-sudo-rettet","status":"publish","type":"page","link":"https:\/\/www.linuxboxen.dk\/?page_id=21477","title":{"rendered":"10 \u00e5r gammel fejl i Sudo rettet."},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-21549 alignright\" src=\"https:\/\/www.linuxboxen.dk\/wp-content\/uploads\/2021\/02\/sudo.png\" alt=\"\" width=\"289\" height=\"193\" \/><\/p>\n<p>10 \u00e5r gammel fejl i Sudo er blevet rettet.<\/p>\n<p>Gammel fejl i Linux-verdenens Sudo kan misbruges af enhver bruger som har en konti p\u00e5 serveren, til at f\u00e5 root-rettigheder.<br \/>\nSikkerheds researchere fra Qualys har fundet en kritisk s\u00e5rbarhed i Sudo, der kan udnyttes til overtagelse af systemet.<\/p>\n<p>Sudo er et open source-kommandolinjeprogram, der bruges p\u00e5 Linux og andre Unix operativsystemer. Det er designet til at give udvalgte, p\u00e5lidelige brugere administrativ kontrol, n\u00e5r det er n\u00f8dvendigt. Fejlen har nummeret CVE-2021-3156.<\/p>\n<p>Qualys-holdet har oplyst, at de var i stand til uafh\u00e6ngigt at verificere s\u00e5rbarheden og udvikle flere udnyttelses varianter til Ubuntu 20.04 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27) og Fedora 33 (Sudo 1.9.2). If\u00f8lge Qualys vil andre operativsystemer og distributioner &#8216;..sandsynligvis ogs\u00e5 kunne udnyttes&#8217;.<\/p>\n<p>Fejlen blev opdaget for to uger siden og blev patchet tidligere i g\u00e5r med frigivelsen af \u200b\u200bSudo v1.9.5p2.<\/p>\n<p>Baron Samedi-fejl<br \/>\nKort fortalt kan fejlen (der har f\u00e5et navnet Baron Samedi, navnet p\u00e5 en af \u00e5nderne i den haitianske voodoo-religion) udnyttes af en angriber, der har f\u00e5et adgang til en lavprivilegeret konto til at f\u00e5 rootadgang, selvom kontoen ikke er angivet i den Sudo-fil, der i f\u00f8rste omgang styrer, hvilke brugere der har adgang til su- eller sudo-kommandoer.<\/p>\n<p>Det fremg\u00e5r af Bleeping Computer, at fejlen opstod i Sudo-koden tilbage i juli 2011, og at den i realiteten p\u00e5virker alle Sudo-versioner, der er frigivet i l\u00f8bet af de sidste ti \u00e5r.<\/p>\n<p>I en erkl\u00e6ring har Qualys sagt, at s\u00e5rbarheden &#8220;..m\u00e5ske er den mest betydningsfulde Sudo-s\u00e5rbarhed i nyere tid (b\u00e5de med hensyn til omfang og virkning)..&#8221;<\/p>\n<p>S\u00e5 opdatere din sudo hurtigst muligt.<\/p>\n<p>Links:<br \/>\n<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-linux-sudo-flaw-lets-local-users-gain-root-privileges\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-linux-sudo-flaw-lets-local-users-gain-root-privileges\/<\/a><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/10-years-old-sudo-bug-lets-linux-users-gain-root-level-access\">https:\/\/www.zdnet.com\/article\/10-years-old-sudo-bug-lets-linux-users-gain-root-level-access<\/a><\/p>\n<p><a href=\"https:\/\/www.theregister.com\/2021\/01\/26\/qualys_sudo_bug\/\">https:\/\/www.theregister.com\/2021\/01\/26\/qualys_sudo_bug\/<\/a><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_21477\" class=\"pvc_stats all  \" data-element-id=\"21477\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.linuxboxen.dk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>10 \u00e5r gammel fejl i Sudo er blevet rettet. Gammel fejl i Linux-verdenens Sudo kan misbruges af enhver bruger som har en konti p\u00e5 serveren, til at f\u00e5 root-rettigheder. Sikkerheds researchere fra Qualys har fundet en kritisk s\u00e5rbarhed i Sudo, der kan udnyttes til overtagelse af systemet. Sudo er et open source-kommandolinjeprogram, der bruges p\u00e5 [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_21477\" class=\"pvc_stats all  \" data-element-id=\"21477\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.linuxboxen.dk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"class_list":["post-21477","page","type-page","status-publish","hentry"],"a3_pvc":{"activated":true,"total_views":68,"today_views":0},"_links":{"self":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/pages\/21477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21477"}],"version-history":[{"count":0,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/pages\/21477\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}