Popular Linux Sudo Command Has A Flaw: Update It Now

Popular Linux Sudo Command Has A Flaw: Update It Now

One of the most renowned and widely-used Linux commands — the Sudo command — has a security flaw, which allows Linux users to run commands as root even when their permission to do so has been denied. The vulnerability was discovered by Joe Vennix of Apple Information Security.


The Sudo Flaw


It is suggested that when a Linux user allows for the Sudo system command to run tasks, they can run those tasks as root even when the permission for the same is not granted.






For those who don’t know, the Linux Sudo command (or Superuser do) is an important command that provides users with ‘elevated privileges.’ The elevated privileges allow for various administrative tasks that users might not be able to perform otherwise.


This can primarily be used to run commands as root but with the required permission of course. The permission involves the use of a special UID allotted to every user. This means that the user’s sudoer entry has the keyword “All” in the Runus application.


Additionally, the Sudo command allows users to run tasks as another user.


However, the new flaw is able to access the UID of another user as either “-1” or “4294967295” in the Sudo command. It provides Linux users, specifically malign users, unauthorized access to run the commands as root.


Since the vulnerability allows for access to run the commands, it treats the UID of the other user (which is mostly 0) as 0 when in reality -1 is entered.






Furthermore, as the Su ..

Support the originator by clicking the read the rest link below.