<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>sudo &#8211; moneyslow.com</title>
	<atom:link href="https://moneyslow.com/tag/sudo/feed" rel="self" type="application/rss+xml" />
	<link>https://moneyslow.com</link>
	<description>making money with technology</description>
	<lastBuildDate>Mon, 12 Jul 2021 10:27:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>
	<item>
		<title>sudo: /usr/libexec/sudo/sudoers.so must be owned by uid 0(sudo: /usr/libexec/sudo/sudoers.so 必须属于用户 ID 0(的用户))</title>
		<link>https://moneyslow.com/sudo-usr-libexec-sudo-sudoers-so-must-be-owned-by-uid-0sudo-usr-libexec-sudo-sudoers-so-%e5%bf%85%e9%a1%bb%e5%b1%9e%e4%ba%8e%e7%94%a8%e6%88%b7-id-0%e7%9a%84%e7%94%a8%e6%88%b7.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Mon, 17 Aug 2020 09:56:43 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[sudo]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=11416</guid>

					<description><![CDATA[$ sudo su - sudo: error in /etc/sudo.conf, line 0 while loading plugin "sudoers_policy" sudo: /usr/libexec/sudo/sudoers.so must be owned by uid 0 sudo: fatal error, unable to load plugins $ sudo su - sudo: 在加载插件“sudoers_policy”时在 /etc/sudo.conf 第 0 行出错 sudo: /usr/libexec/sudo/sudoers.so 必须属于用户 ID 0(的用户) sudo: 致命错误，无法加载插件 解决：以root用户身份执行： pkexec chown root /usr/lib/sudo/sudoers.so 或者 /usr/libexec/sudo/sudoers.so]]></description>
		
		
		
			</item>
		<item>
		<title>sudo提权漏洞sudo版本升级方法（Sudo配置不当致权限提升漏洞CVE-2019-14287）</title>
		<link>https://moneyslow.com/sudo%e6%8f%90%e6%9d%83%e6%bc%8f%e6%b4%9esudo%e7%89%88%e6%9c%ac%e5%8d%87%e7%ba%a7%e6%96%b9%e6%b3%95%ef%bc%88sudo%e9%85%8d%e7%bd%ae%e4%b8%8d%e5%bd%93%e8%87%b4%e6%9d%83%e9%99%90%e6%8f%90%e5%8d%87.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Fri, 18 Oct 2019 05:02:22 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[centos]]></category>
		<category><![CDATA[sudo]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=9286</guid>

					<description><![CDATA[Sudo配置不当的情况下，本地攻击者通过构造特殊命令，可以绕过Sudo限制以root身份在服务器上执行任意命令。漏洞实际利用场景为本地提权，风险较低。 漏洞描述：当/etc/sudoers 文件中存在 *=(ALL, *) 形式的配置时，本地攻击者可以通过指定用户ID为-1或者4294967295，从而以root权限在服务器上执行命令。 漏洞评级 CVE-2019-14287 低危 影响版本 Sudo &#60; 1.2.28 安全建议 升级Sudo版本到 1.2.28 官方说明： https://www.sudo.ws/alerts/minus_1_uid.html sudo漏洞的判断： $ sudo id Sorry, user a is not allowed to execute '/bin/id' as root. 提权成功： $ sudo -u#-1 id uid=0(root) gid=0(root) groups=0(root) sudo漏洞修复的效果： $ sudo -u#-1 id -u sudo: unknown user: #-1 sudo: unable to initialize [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
