<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>unix &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/unix/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Mon, 14 Oct 2019 22:19:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>unix &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>One of Linux&#8217;s most important commands had a glaring security flaw</title>
		<link>https://www.efrtechgroup.com/tech/one-of-linuxs-most-important-commands-had-a-glaring-security-flaw/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Mon, 14 Oct 2019 22:19:00 +0000</pubDate>
				<category><![CDATA[command line]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[operating system]]></category>
		<category><![CDATA[personal computing]]></category>
		<category><![CDATA[personalcomputing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[unix]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/one-of-linuxs-most-important-commands-had-a-glaring-security-flaw/</guid>

					<description><![CDATA[[ad_1] The quirk revolved around sudo&#8217;s treatment of user IDs. If you typed the command with a user ID of -1 or its unsigned equivalent 4294967295, it would treat you as if you had root access (user ID 0) even as it recorded the actual user ID in the log. The user IDs in question [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>The quirk revolved around sudo&#8217;s treatment of user IDs.  If you typed the command with a user ID of -1 or its unsigned equivalent 4294967295, it would treat you as if you had root access (user ID 0) even as it recorded the actual user ID in the log.  The user IDs in question don&#8217;t exist in the password database, either, so the command won&#8217;t require a password to use.</p>
<p>Linux users can update to a newer sudo package (1.8.28 or later) to fix the flaw.  You might not be immediately vulnerable, as any attacker will need to have command line control over your system before they can even consider exploiting the flaw &#8212; at that point, you probably have larger problems.  Still, it&#8217;s not entirely comforting to know that such an important command was vulnerable.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/10/14/linux-unix-sudo-command-security-flaw/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
