copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
Critical Sudo Vulnerabilities Let Local Users Gain Root . . . Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux and Unix-like operating systems that could enable local attackers to escalate their privileges to root on susceptible machines A brief description of the vulnerabilities is below - Sudo is a
Several major Linux distros hit by serious Sudo security flaws A decade-old flaw Sudo (short for “superuser do”) is a command that allows a permitted user to execute a command as the root user or another user, as defined in the system’s security policy
Local Privilege Escalation via chroot option | Sudo Sudo’s -R (--chroot) option is intended to allow the user to run a command with a user-selected root directory if the sudoers file allows it A change was made in sudo 1 9 14 to resolve paths via chroot() using the user-specified root directory while the sudoers file was still being evaluated
12-Year-Old Sudo Vulnerability Chroot Flaw Enable Privilege . . . The flaw, present in Sudo’s codebase for over 12 years, was discovered by Rich Mirch of the Stratascale Cyber Research Unit and affects both stable (v1 9 0–1 9 17) and legacy (v1 8 8–1 8 32) versions of Sudo