Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB

  1. Home
  2. uncategorized
  3. so for up to 2 years it has been trivial to escalate to root on any machine that had sudo >=1.19.4 installed.

so for up to 2 years it has been trivial to escalate to root on any machine that had sudo >=1.19.4 installed.

Scheduled Pinned Locked Moved uncategorized
10 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mildsunrise@tech.lgbtM This user is from outside of this forum
    mildsunrise@tech.lgbtM This user is from outside of this forum
    mildsunrise@tech.lgbt
    wrote last edited by
    #1

    so for up to 2 years it has been trivial to escalate to root on any machine that had sudo >=1.19.4 installed. amazing. marvelous.

    a1ba@suya.placeA mildsunrise@tech.lgbtM 2 Replies Last reply
    0
    • mildsunrise@tech.lgbtM mildsunrise@tech.lgbt

      so for up to 2 years it has been trivial to escalate to root on any machine that had sudo >=1.19.4 installed. amazing. marvelous.

      a1ba@suya.placeA This user is from outside of this forum
      a1ba@suya.placeA This user is from outside of this forum
      a1ba@suya.place
      wrote last edited by
      #2
      @mildsunrise what happened again
      mildsunrise@tech.lgbtM 1 Reply Last reply
      0
      • a1ba@suya.placeA a1ba@suya.place
        @mildsunrise what happened again
        mildsunrise@tech.lgbtM This user is from outside of this forum
        mildsunrise@tech.lgbtM This user is from outside of this forum
        mildsunrise@tech.lgbt
        wrote last edited by
        #3

        @a1ba sudo processed the --chroot option before actually reading sudoers, so you can make it load a custom binary https://openwall.com/lists/oss-security/2025/06/30/3

        a1ba@suya.placeA 1 Reply Last reply
        0
        • mildsunrise@tech.lgbtM mildsunrise@tech.lgbt

          @a1ba sudo processed the --chroot option before actually reading sudoers, so you can make it load a custom binary https://openwall.com/lists/oss-security/2025/06/30/3

          a1ba@suya.placeA This user is from outside of this forum
          a1ba@suya.placeA This user is from outside of this forum
          a1ba@suya.place
          wrote last edited by
          #4
          @mildsunrise certified screaming sandwich moment
          1 Reply Last reply
          0
          • a1ba@suya.placeA a1ba@suya.place shared this topic
          • mildsunrise@tech.lgbtM mildsunrise@tech.lgbt

            so for up to 2 years it has been trivial to escalate to root on any machine that had sudo >=1.19.4 installed. amazing. marvelous.

            mildsunrise@tech.lgbtM This user is from outside of this forum
            mildsunrise@tech.lgbtM This user is from outside of this forum
            mildsunrise@tech.lgbt
            wrote last edited by
            #5

            it doesn't require anything. it doesn't even require normal rules in sudoers. I'm not sure it even requires a sudoers at all, just the sudo binary to be installed.

            the only consolation is that it's not (known to be) exploitable on systems using something other than glibc

            mildsunrise@tech.lgbtM 1 Reply Last reply
            0
            • mildsunrise@tech.lgbtM mildsunrise@tech.lgbt

              it doesn't require anything. it doesn't even require normal rules in sudoers. I'm not sure it even requires a sudoers at all, just the sudo binary to be installed.

              the only consolation is that it's not (known to be) exploitable on systems using something other than glibc

              mildsunrise@tech.lgbtM This user is from outside of this forum
              mildsunrise@tech.lgbtM This user is from outside of this forum
              mildsunrise@tech.lgbt
              wrote last edited by
              #6

              this is so insultingly easy to exploit + widely affecting that I'm considering if it was a backdoor. either way my trust in sudo as a project is completely shattered by now

              ? 1 Reply Last reply
              0
              • mildsunrise@tech.lgbtM mildsunrise@tech.lgbt

                this is so insultingly easy to exploit + widely affecting that I'm considering if it was a backdoor. either way my trust in sudo as a project is completely shattered by now

                ? Offline
                ? Offline
                Guest
                wrote last edited by
                #7

                @mildsunrise if the --chroot option isn't widely used this sounds more like the log4j vuln where someone asked to keep a feature nobody owned so nobody was taking care of it

                ? 1 Reply Last reply
                0
                • ? Guest

                  @mildsunrise if the --chroot option isn't widely used this sounds more like the log4j vuln where someone asked to keep a feature nobody owned so nobody was taking care of it

                  ? Offline
                  ? Offline
                  Guest
                  wrote last edited by
                  #8

                  @mildsunrise "trust completely shattered" is an extremely strong statement to make along with concerns about a backdoor is there other background that leads you to believe this

                  mildsunrise@tech.lgbtM 1 Reply Last reply
                  0
                  • ? Guest

                    @mildsunrise "trust completely shattered" is an extremely strong statement to make along with concerns about a backdoor is there other background that leads you to believe this

                    mildsunrise@tech.lgbtM This user is from outside of this forum
                    mildsunrise@tech.lgbtM This user is from outside of this forum
                    mildsunrise@tech.lgbt
                    wrote last edited by
                    #9

                    @hipsterelectron trust is shattered because chrooting to a fully untrusted path to do anything other than immediately dropping privileges should be an immediate code smell... although looking at the patches now I kinda walk my words back a bit, it isn't entirely obvious that we get to the function before even checking sudoers

                    a1ba@suya.placeA 1 Reply Last reply
                    0
                    • mildsunrise@tech.lgbtM mildsunrise@tech.lgbt

                      @hipsterelectron trust is shattered because chrooting to a fully untrusted path to do anything other than immediately dropping privileges should be an immediate code smell... although looking at the patches now I kinda walk my words back a bit, it isn't entirely obvious that we get to the function before even checking sudoers

                      a1ba@suya.placeA This user is from outside of this forum
                      a1ba@suya.placeA This user is from outside of this forum
                      a1ba@suya.place
                      wrote last edited by
                      #10
                      @mildsunrise @hipsterelectron on the other hand, a tool that's only purpose to be a backdoor for admins... shouldn't be that complex?

                      Same goes for PAM honestly.
                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      Powered by NodeBB Contributors
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups