Jump to content

10-year-old Sudo bug lets Linux users gain root-level access

Summary

A major vulnerability impacting a large chunk of the Linux ecosystem has been patched today in Sudo, an app that allows admins to delegate limited root access to other users. The vulnerability, named "Baron Samedit," impacts most Linux distributions today.

 

Quotes

Quote

A major vulnerability impacting a large chunk of the Linux ecosystem has been patched today in Sudo, an app that allows admins to delegate limited root access to other users. The vulnerability, which received a CVE identifier of CVE-2021-3156, but is more commonly known as "Baron Samedit," was discovered by security auditing firm Qualys two weeks ago and was patched earlier today with the release of Sudo v1.9.5p2.

In a simple explanation provided by the Sudo team today, the Baron Samedit bug can be exploited by an attacker who has gained access to a low-privileged account to gain root access, even if the account isn't listed in /etc/sudoers — a config file that controls which users are allowed access to su or sudo commands in the first place.

 

While there have been two other Sudo security flaws disclosed over the past two years, the bug disclosed today is the one considered the most dangerous of all three. Making matters worse, the bug also has a long tail. Qualys said the bug was introduced in the Sudo code back in July 2011, effectively impacting all Sudo versions released over the past ten years. "Other operating systems and distributions are also likely to be exploitable," the security firm said. All in all, the Baron Samedit vulnerabilities is one of the rare Sudo security flaws that can also be successfully weaponized in the real world, in comparison to the previous two bugs disclosed in years prior.

 

My thoughts

Ho boy, this seems bad. hopefully it gets patched soon (edit: It was patched, update your sudo) and we can sudo in peace. I(i used arch btw, sorry had to)

 

Sources

https://www.zdnet.com/google-amp/article/10-years-old-sudo-bug-lets-linux-users-gain-root-level-access/

"A high ideal missed by a little, is far better than low ideal that is achievable, yet far less effective"

 

If you think I'm wrong, correct me. If I've offended you in some way tell me what it is and how I can correct it. I want to learn, and along the way one can make mistakes; Being wrong helps you learn what's right.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, J-from-Nucleon said:

 

Ho boy, this seems bad. hopefully it gets patched soon and we can sudo in peace. I(i used arch btw, sorry had to)

isn't this literally an article on how it was patched?

AMD blackout rig

 

cpu: ryzen 5 3600 @4.4ghz @1.35v

gpu: rx5700xt 2200mhz

ram: vengeance lpx c15 3200mhz

mobo: gigabyte b550 auros pro 

psu: cooler master mwe 650w

case: masterbox mbx520

fans:Noctua industrial 3000rpm x6

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Letgomyleghoe said:

isn't this literally an article on how it was patched?

*facepalm*

Huh, I didn't notice. Guess I should read better

well nevermind then

 

"A high ideal missed by a little, is far better than low ideal that is achievable, yet far less effective"

 

If you think I'm wrong, correct me. If I've offended you in some way tell me what it is and how I can correct it. I want to learn, and along the way one can make mistakes; Being wrong helps you learn what's right.

Link to comment
Share on other sites

Link to post
Share on other sites

still interesting article

8 minutes ago, J-from-Nucleon said:

*facepalm*

 

 

Anything i've written between the * and * is not meant to be taken seriously.

keep in mind that helping with problems is hard if you aren't specific and detailed.

i'm also not a professional, (yet) so make sure to personally verify important information as i could be wrong.

 

Link to comment
Share on other sites

Link to post
Share on other sites

Well most linux users regularly do apt update and upgrade so this shouldn't be an issue right?

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, williamcll said:

Well most linux users regularly do apt update and upgrade so this shouldn't be an issue right?

as long as they update it won't. 

AMD blackout rig

 

cpu: ryzen 5 3600 @4.4ghz @1.35v

gpu: rx5700xt 2200mhz

ram: vengeance lpx c15 3200mhz

mobo: gigabyte b550 auros pro 

psu: cooler master mwe 650w

case: masterbox mbx520

fans:Noctua industrial 3000rpm x6

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

If its a security update my Ubuntu server box will pull it automatically (I think), I'll run pamac on Arch later manually.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Master Disaster said:

If its a security update my Ubuntu server box will pull it automatically (I think)

As someone who runs Ubuntu on a daily basis I can assure you that is correct; as much as people sht on Window's Auto Update, it kept driving me crazy that I kept having issues with firejail + vmware (non-commercial free edition) until I figured out that it was the auto kernel upgrades that kept throwing off my setup.  Having a 100% customizable setup can definitely be a bit of a double-edged sword as I've learned the hard way...

Yes this is also why I immediately went to check for updates manually as soon as I read this news post.

Edited by linuxChips2600
Clarify connection to previous post/comment
Link to comment
Share on other sites

Link to post
Share on other sites

Yeah, nothing for me except a Grub update...

 

Untitled.thumb.png.9b7a19df1c268ca7128ab807ff95e86f.png

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Master Disaster said:

Yeah, nothing for me except a Grub update...

 

Untitled.thumb.png.9b7a19df1c268ca7128ab807ff95e86f.png

Here's Ubuntu's own CVE listing FYI - https://ubuntu.com/security/CVE-2021-3156
 

Also are you running the *LTS HWE* version of Ubuntu? I've learned that particular LTS version tends to get updates more often and (probably) for longer periods of time since it also needs to support the latest hardware for at least quite a while after initial release.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, linuxChips2600 said:

Here's Ubuntu's own CVE listing FYI - https://ubuntu.com/security/CVE-2021-3156

Thanks but there's no need for it, I can tell its pulled something since its prompting for a reboot and a quick apt-cache check shows Sudo was updated last night.

 

One thing though, on the CVE site you linked it says "Sudo versions prior to 1.9.5 have,,,," while the "fixed" version is 1.9.1.

 

Huh?

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Master Disaster said:

One thing though, on the CVE site you linked it says "Sudo versions prior to 1.9.5 have,,,," while the "fixed" version is 1.9.1.

 

Huh?

I have found that Ubuntu (being a "custom Debian") does slightly different versioning for packages depending on the distro *especially* if it is an LTS version, as can be seen from this gdb launchpad.net repo: https://launchpad.net/ubuntu/+source/gdb
 

... is what I was going to basically say, until I did a double take at that website linked and it said "Upstream Needs triage"

So from what I can gather from these sites:
https://wiki.ubuntu.com/SecurityTeam/BugTriage
https://wiki.ubuntu.com/Bugs/Triage?action=show&redirect=Bugs%2FHowToTriage
 

It seems that Canonical (the main driving force behind Ubuntu) is just being Canonical again and not necessarily having everyone's best interests in mind.

Looks like OP might be onto something, although I'm not exactly happy about what I'm discovering here...

Time to switch to Arch for me?

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, linuxChips2600 said:

I have found that Ubuntu (being a "custom Debian") does slightly different versioning for packages depending on the distro *especially* if it is an LTS version, as can be seen from this gdb launchpad.net repo: https://launchpad.net/ubuntu/+source/gdb
 

... is what I was going to basically say, until I did a double take at that website linked and it said "Upstream Needs triage"

So from what I can gather from these sites:
https://wiki.ubuntu.com/SecurityTeam/BugTriage
https://wiki.ubuntu.com/Bugs/Triage?action=show&redirect=Bugs%2FHowToTriage
 

It seems that Canonical (the main driving force behind Ubuntu) is just being Canonical again and not necessarily having everyone's best interests in mind.

Looks like OP might be onto something, although I'm not exactly happy about what I'm discovering here...

Time to switch to Arch for me?

I don't necessarily have an issue with them using different package versioning as long as they're consistent with it. If I'm not sure about something I'll often Google it and be sure the info is relevant to my distro, the fact they (might) use different versioning on their CVE listing and their release packages makes it very difficult be be sure what I'm reading is correct.

 

Similarly I'm actually not against Canonical focusing on becoming self sustaining, they do have to survive as a business. Whats the point in having a community council to give input on Ubuntu's future if the future of Canonical is bankruptcy. Just don't start pushing changes to Ubuntu that make it vastly different other mainstream distros, the reason Ubuntu is recommended as a nice distro to learn Linux on is because it ships with a nice set of packages, doesn't require users to manually edit config files in order for it to work, can be used for everyday tasks without the need for a terminal at all, is focused on ease of use over customisation and manual control and has a vast community of support on the web but still contains all the required tools for users to push into more advanced Linux stuff should they want to.

 

If they lose that raison d'etre they have nothing special to offer the Linux community at all and other similar distros (openSUSE, & Fedora) will sweep in and replace them.

 

Edit - Also Arch has a certain stigma attached to it, I went into it expecting to be met with very little documentation and elitism when asking the community for help. My experience has been the exact opposite, the Arch Wiki is very well maintained and actually is written in a way which is easier to understand than Ubuntu's documentation and every time I've fucked something up and asked for help I've received very clear instructions on how to fix the issues.

 

The fact you start with the bare minimum (when installed it consists of Grub, systemd and shell, thats it) and build your own environment means you can have exactly what you need and nothing you don't need plus it taught me so much about the linux filesystem, using shell and not being totally reliant on a UI, how things are configured and why things are done the way they are which IMO is a great thing.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

I edited a comic.

 

image.png.8ad65f97262198c82d3046632dd20d07.png

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

I mean, it’s not great but if you are using Linux you will probably be fine anyway. 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×