TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
A critical vulnerability in Sudo allows gaining root access in almost any Linux distro

A critical vulnerability in Sudo allows gaining root access in almost any Linux distro

Barış SelmanbyBarış Selman
27 January 2021
in Security, Tech
Reading Time: 2 mins read
Share on FacebookShare on Twitter

A critical vulnerability in Sudo allows gaining root access in almost any Linux distro. The Qualys security research team has discovered a critical vulnerability in Sudo that dates back almost 10 years. The bug dubbed “Baron Samedi” can be exploited by any local user and affects a good part of the Linux distribution ecosystem.

The bug in question can be exploited to gain root privileges, even if the user is not listed in the sudoers file, i.e. the file that controls who, which, with what privileges and on which machines can execute commands, and whether passwords are required.

A critical vulnerability in Sudo allows gaining root access in almost any Linux distro

Sudo is a tool that allows a system administrator to delegate authority to grant certain users (or groups of users) the ability to execute some (or all) commands as root or another type of user while providing an audit trail of commands and their arguments.

A critical vulnerability in Sudo allows gaining root access in almost any Linux distro
A critical vulnerability in Sudo allows gaining root access in almost any Linux distro

Sudo, moreover, is available on virtually all Unix-style operating systems, and this vulnerability was introduced in July 2011, almost 10 years ago. Baron Samedi affects all legacy versions from 1.8.2 to 1.8.31p2, and all stable versions of Sudo from 1.9.0 to 1.9.5p1 in their default configuration.

The researchers were able to test for the vulnerability and develop multiple variants to exploit it in Ubuntu 20.04, Debian 10, Fedora 33, and Gentoo, but indicate that other operating systems and distributions are likely to be affected.

This vulnerability can be exploited in the real world. For example, if botnet operators perform brute-force attacks on low-level accounts, they can exploit the bug in a second part of the attack to help intruders easily gain root access and take full control of a hacked server. And, as discussed on ZDNet, botnet attacks targeting Linux systems using brute force are quite common these days.

The bug was fixed by the Sudo team, who thanked Qualys for their detailed report, the recommendation is to update affected systems as soon as possible. Sudo version 1.9.5p2 should be installed or patched by each vendor.

Tags: Accessfeaturedlinuxserversoftwaretechnology
ShareTweet
Barış Selman

Barış Selman

A technology and gaming enthusiast by day, Barış is a passionate composer and black/death metal guitarist by night. He keeps his finger on the pulse of the intersection of art and technology whenever he can from his tours worldwide.

Related Posts

Apple begins iPhone 18 series production testing in January

Apple begins iPhone 18 series production testing in January

24 December 2025
EA investigates AI claims in Battlefield 6 cosmetics

EA investigates AI claims in Battlefield 6 cosmetics

24 December 2025
Amazon Alexa+ will book your hotels and salons starting in 2026

Amazon Alexa+ will book your hotels and salons starting in 2026

24 December 2025
OpenAI launches Skills in Codex

OpenAI launches Skills in Codex

24 December 2025
Please login to join discussion

LATEST

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

How to connect a PS4 controller to Steam via USB or Bluetooth

How to connect your phone to Wi-Fi and fix connection issues

Apple begins iPhone 18 series production testing in January

EA investigates AI claims in Battlefield 6 cosmetics

Amazon Alexa+ will book your hotels and salons starting in 2026

OpenAI launches Skills in Codex

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska