A vulnerability in sudo can elevate unprivileged users to root privileges. Credit: Pashaignatov / Getty Images Linux users should immediately patch a serious vulnerability to the sudo command that, if exploited, can allow unprivileged users gain root privileges on the host machine. Called Baron Samedit, the flaw has been “hiding in plain sight” for about 10 years, and was discovered earlier this month by researchers at Qualys and reported to sudo developers, who came up with patches Jan. 19, according to a Qualys blog. (The blog includes a video of the flaw being exploited.) A new version of sudo—sudo v1.9.5p2—has been created to patch the problem, and notifications have been posted for many Linux distros including Debian, Fedora, Gentoo, Ubuntu, and SUSE, according to Qualys. According to the common vulnerabilities and exposures (CVE) description of Baron Samedit (CVE-2021-3156), the flaw can be exploited “via ‘sudoedit -s’ and a command-line argument that ends with a single backslash character.” According to Qualys, the flaw was introduced in July 2011 and affects legacy versions from 1.8.2 to 1.8.31p2 as well as default configurations of versions from 1.9.0 to 1.9.5p1. The purpose of sudo is for adminst to administer user system privileges. For Ubuntu users, the patched sudo version appears to be related to the version of the OS you are running. The Ubuntu site shows this release-specific information for the flaw: Ubuntu 21.04 (Hirsute Hippo) Released (1.9.4p2-2ubuntu2) Ubuntu 20.10 (Groovy Gorilla) Released (1.9.1-1ubuntu1.1) Ubuntu 20.04 LTS (Focal Fossa) Released (1.8.31-1ubuntu1.2) Ubuntu 18.04 LTS (Bionic Beaver) Released (1.8.21p2-3ubuntu1.4) Ubuntu 16.04 LTS (Xenial Xerus) Released (1.8.16-0ubuntu1.10) Ubuntu 14.04 ESM (Trusty Tahr) Released (1.8.9p5-1ubuntu1.5+esm6) Use the sudo -version command to view which release you are running. Checking sudo on a 20.04 system, for example, you might see this: $ sudo —version Sudo version 1.8.31 Sudoers policy plugin version 1.8.31 Sudoers file grammar version 46 Sudoers I/O plugin version 1.8.31 Another way to determine if your systems are vulnerable is to run a command such as sudoedit -s /. If the command returns a usage statement, your system is OK. If it returns an error starting with “sudoedit”, you need the patch. Related content how-to Getting started on the Linux (or Unix) command line, Part 4 Pipes, aliases and scripts make Linux so much easier to use. By Sandra Henry-Stocker Nov 27, 2023 4 mins Linux how-to Getting started on the Linux (or Unix) command line, Part 3 Our Linux cheat sheet includes some of the most commonly used commands along with brief explanations and examples of what the commands can do. By Sandra Henry Stocker Nov 21, 2023 6 mins Linux how-to Getting started on the Linux (or Unix) command line, Part 2 Commands that provide help are essential. Here's a look at some of the help you can get from the Linux system itself. By Sandra Henry Stocker Nov 20, 2023 5 mins Linux how-to Getting started on the Linux (or Unix) command line, Part 1 This series of posts will help Linux/Unix newbies to feel comfortable on the command line. By Sandra Henry Stocker Nov 16, 2023 8 mins Linux Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe