{"id":6544,"date":"2021-01-27T11:40:00","date_gmt":"2021-01-27T10:40:00","guid":{"rendered":"https:\/\/webhosting.de\/?p=6544"},"modified":"2021-01-27T12:09:55","modified_gmt":"2021-01-27T11:09:55","slug":"sudo-critical-security-leaks-found","status":"publish","type":"post","link":"https:\/\/webhosting.de\/ja\/sudo-kritische-sicherheitsluecke-gefunden\/","title":{"rendered":"SUDO: \u91cd\u5927\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u8106\u5f31\u6027\u304c\u767a\u898b\u3055\u308c\u307e\u3057\u305f"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6544\" class=\"elementor elementor-6544\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6fe083c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6fe083c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7949547\" data-id=\"7949547\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d61cafb elementor-widget elementor-widget-text-editor\" data-id=\"d61cafb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Das Qualys-Forschungsteam hat eine Heap-Overflow-Schwachstelle in <strong>sudo<\/strong> entdeckt, einem nahezu allgegenw\u00e4rtigen Dienstprogramm, das auf den wichtigsten Unix-\u00e4hnlichen Betriebssystemen verf\u00fcgbar ist. Jeder <span style=\"text-decoration: underline;\">unprivilegierte Benutzer<\/span> kann auf einem verwundbaren Host mit einer <strong>Standard-Sudo-Konfiguration<\/strong> Root-Rechte erlangen, indem er diese Sicherheitsl\u00fccke ausnutzt.<\/p><p>Sudo ist ein leistungsf\u00e4higes Dienstprogramm, das in den meisten, wenn nicht allen Unix- und Linux-basierten Betriebssystemen enthalten ist. Es erm\u00f6glicht Benutzern, Programme mit den Sicherheitsrechten eines anderen Benutzers auszuf\u00fchren. Die Sicherheitsl\u00fccke selbst ist <strong>seit fast 10 Jahren<\/strong> im Verborgenen geblieben. Sie wurde im Juli 2011 (Commit 8255ed69) eingef\u00fchrt und betrifft alle Legacy-Versionen von 1.8.2 bis 1.8.31p2 und alle stabilen Versionen von 1.9.0 bis 1.9.5p1 in ihrer Standardkonfiguration.<\/p><h2><span style=\"font-size: 1rem;\">Die erfolgreiche Ausnutzung dieser Schwachstelle erm\u00f6glicht es jedem unprivilegierten Benutzer, Root-Rechte auf dem verwundbaren Host zu erlangen. Die Sicherheitsforscher von Qualys waren in der Lage, die Schwachstelle unabh\u00e4ngig zu verifizieren und mehrere Varianten des Exploits zu entwickeln und volle Root-Rechte auf Ubuntu 20.04 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27) und Fedora 33 (Sudo 1.9.2) zu erlangen.<\/span><\/h2><p>Es ist sehr wahrscheinlich, dass auch andere Betriebssysteme und Distributionen ausnutzbar sind.<\/p><h2 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif; color: #333333;\">Ist mein System betroffen?<\/h2><p>Wenn das System noch die verwundbare sudo Version verwendet kann man das durch den Aufruf dieses Befehls pr\u00fcfen:<\/p><p>sudoedit -s \/<\/p><p>Wird eine Ausgabe wie beispielsweise:<\/p><p><span style=\"text-decoration: underline;\"><strong>sudoedit: \/: Keine regul\u00e4re Datei<\/strong><\/span><\/p><p>angezeigt, dann ist die sudo Version verwundbar.<\/p><p>Ein aktualisiertes sudo gibt folgende R\u00fcckmeldung aus:<\/p><p><span style=\"text-decoration: underline;\"><strong>usage: sudoedit [-AknS] [-r role] [-t type] [-C num] [-g group] [-h host] [-p prompt] [-T timeout] [-u user] file &#8230;<\/strong><\/span><\/p><p><span style=\"font-size: 1rem;\">Zum Gl\u00fcck gibt es aber bereits Patches die schon vor der Ver\u00f6ffentlichung eingespielt wurden, sofern man ein auto-update aktiviert hat.<\/span><\/p><p>Sehr zu empfehlen ist es daher generell bei Linux alle Pakete automatisch aktualisieren zu lassen sofern dieses m\u00f6glich ist.<\/p><p>Originalmeldung bei <a href=\"https:\/\/blog.qualys.com\/vulnerabilities-research\/2021\/01\/26\/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit\" target=\"_blank\" rel=\"noopener\">Qualys im Blog<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31e8c5b elementor-widget elementor-widget-heading\" data-id=\"31e8c5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sicherheitshinweise der Distributionen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c41308a elementor-widget elementor-widget-text-editor\" data-id=\"c41308a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"rte__list rte__list--unordered\"><li><a href=\"https:\/\/security.archlinux.org\/CVE-2021-3156\" target=\"_blank\" rel=\"external noopener\">Arch Linux Advisory zu CVE-2021-3156<\/a><\/li><li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2021-3156\" target=\"_blank\" rel=\"external noopener\">Debian Security-Tracker<\/a><\/li><li><a href=\"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY\/\" target=\"_blank\" rel=\"external noopener\">Fedora 33: sudo-1.9.5p2-1.fc33<\/a><\/li><li><a href=\"https:\/\/bugs.freebsd.org\/bugzilla\/show_bug.cgi?id=253034\" target=\"_blank\" rel=\"external noopener\">FreeBSD-Bugtracker<\/a><\/li><li><a href=\"https:\/\/security.gentoo.org\/glsa\/202101-33\" target=\"_blank\" rel=\"external noopener\">Gentoo Linux Advisory<\/a><\/li><li><a href=\"https:\/\/access.redhat.com\/security\/cve\/CVE-2021-3156\" target=\"_blank\" rel=\"external noopener\">Red Hat Customer Portal: RHEL-Updates<\/a><\/li><li><a href=\"https:\/\/www.suse.com\/support\/kb\/doc\/?id=000019841\" target=\"_blank\" rel=\"external noopener\">SUSE Linux Enterprise Server<\/a><\/li><li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-3156\" target=\"_blank\" rel=\"external noopener\">Ubuntu zu CVE-2021-3156<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-5fde191 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5fde191\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21c3f67\" data-id=\"21c3f67\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a2d9a62 elementor-widget elementor-widget-video\" data-id=\"a2d9a62\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;vimeo&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe\" allowfullscreen allow=\"clipboard-write\" title=\"vimeo \u52d5\u753b\u30d7\u30ec\u30fc\u30e4\u30fc\" src=\"https:\/\/player.vimeo.com\/video\/504872555?color&amp;autopause=0&amp;loop=0&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1#t=\"><\/iframe>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Das Qualys-Forschungsteam hat eine Heap-Overflow-Schwachstelle in sudo entdeckt, einem nahezu allgegenw\u00e4rtigen Dienstprogramm, das auf den wichtigsten Unix-\u00e4hnlichen Betriebssystemen verf\u00fcgbar ist. Jeder unprivilegierte Benutzer kann auf einem verwundbaren Host mit einer Standard-Sudo-Konfiguration Root-Rechte erlangen, indem er diese Sicherheitsl\u00fccke ausnutzt. Sudo ist ein leistungsf\u00e4higes Dienstprogramm, das in den meisten, wenn nicht allen Unix- und Linux-basierten Betriebssystemen enthalten ist. Es erm\u00f6glicht Benutzern, Programme mit den Sicherheitsrechten eines anderen Benutzers auszuf\u00fchren. Die Sicherheitsl\u00fccke selbst ist seit fast 10 Jahren im Verborgenen geblieben. Sie wurde im Juli 2011 (Commit 8255ed69) eingef\u00fchrt und betrifft alle Legacy-Versionen von 1.8.2 bis 1.8.31p2 und alle stabilen Versionen von 1.9.0 bis 1.9.5p1 in ihrer Standardkonfiguration. Die erfolgreiche Ausnutzung dieser Schwachstelle [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6546,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[117,971,970],"class_list":["post-6544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-linux","tag-sicherheitsluecke","tag-sudo"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":null,"rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":"sudo","_yoast_wpseo_linkdex":"59","_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":"<iframe title=\"CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)\" src=\"https:\/\/player.vimeo.com\/video\/504872555?dnt=1&amp;app_id=122963\" width=\"800\" height=\"600\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":"1611744857","_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1611747583:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1611744886","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1611744879","rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4250","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"sudo-critical-security-leak-found","_trp_automatically_translated_slug_lv":"sudo-critical-security-leak-found","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"sudo-critical-security-leak-found","_trp_automatically_translated_slug_ja":"sudo-critical-security-leaks-found","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":"builder","_elementor_template_type":"wp-post","_elementor_version":"3.1.0","_elementor_pro_version":"3.0.9","_wp_page_template":"default","_elementor_page_settings":{"ha_grid_zindex":"1000"},"_elementor_data":"[{\"id\":\"6fe083c\",\"elType\":\"section\",\"settings\":{\"_ha_condition_list\":[{\"_id\":\"b45f167\"}]},\"elements\":[{\"id\":\"7949547\",\"elType\":\"column\",\"settings\":{\"_column_size\":100,\"_inline_size\":null,\"_ha_condition_list\":[{\"_id\":\"858d931\"}]},\"elements\":[{\"id\":\"d61cafb\",\"elType\":\"widget\",\"settings\":{\"editor\":\"<p>Das Qualys-Forschungsteam hat eine Heap-Overflow-Schwachstelle in <strong>sudo<\\\/strong> entdeckt, einem nahezu allgegenw\\u00e4rtigen Dienstprogramm, das auf den wichtigsten Unix-\\u00e4hnlichen Betriebssystemen verf\\u00fcgbar ist. Jeder <span style=\\\"text-decoration: underline;\\\">unprivilegierte Benutzer<\\\/span> kann auf einem verwundbaren Host mit einer <strong>Standard-Sudo-Konfiguration<\\\/strong> Root-Rechte erlangen, indem er diese Sicherheitsl\\u00fccke ausnutzt.<\\\/p><p>Sudo ist ein leistungsf\\u00e4higes Dienstprogramm, das in den meisten, wenn nicht allen Unix- und Linux-basierten Betriebssystemen enthalten ist. Es erm\\u00f6glicht Benutzern, Programme mit den Sicherheitsrechten eines anderen Benutzers auszuf\\u00fchren. Die Sicherheitsl\\u00fccke selbst ist <strong>seit fast 10 Jahren<\\\/strong> im Verborgenen geblieben. Sie wurde im Juli 2011 (Commit 8255ed69) eingef\\u00fchrt und betrifft alle Legacy-Versionen von 1.8.2 bis 1.8.31p2 und alle stabilen Versionen von 1.9.0 bis 1.9.5p1 in ihrer Standardkonfiguration.<\\\/p><h2><span style=\\\"font-size: 1rem;\\\">Die erfolgreiche Ausnutzung dieser Schwachstelle erm\\u00f6glicht es jedem unprivilegierten Benutzer, Root-Rechte auf dem verwundbaren Host zu erlangen. Die Sicherheitsforscher von Qualys waren in der Lage, die Schwachstelle unabh\\u00e4ngig zu verifizieren und mehrere Varianten des Exploits zu entwickeln und volle Root-Rechte auf Ubuntu 20.04 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27) und Fedora 33 (Sudo 1.9.2) zu erlangen.<\\\/span><\\\/h2><p>Es ist sehr wahrscheinlich, dass auch andere Betriebssysteme und Distributionen ausnutzbar sind.<\\\/p><h2 style=\\\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif; color: #333333;\\\">Ist mein System betroffen?<\\\/h2><p>Wenn das System noch die verwundbare sudo Version verwendet kann man das durch den Aufruf dieses Befehls pr\\u00fcfen:<\\\/p><p>sudoedit -s \\\/<\\\/p><p>Wird eine Ausgabe wie beispielsweise:<\\\/p><p><span style=\\\"text-decoration: underline;\\\"><strong>sudoedit: \\\/: Keine regul\\u00e4re Datei<\\\/strong><\\\/span><\\\/p><p>angezeigt, dann ist die sudo Version verwundbar.<\\\/p><p>Ein aktualisiertes sudo gibt folgende R\\u00fcckmeldung aus:<\\\/p><p><span style=\\\"text-decoration: underline;\\\"><strong>usage: sudoedit [-AknS] [-r role] [-t type] [-C num] [-g group] [-h host] [-p prompt] [-T timeout] [-u user] file ...<\\\/strong><\\\/span><\\\/p><p><span style=\\\"font-size: 1rem;\\\">Zum Gl\\u00fcck gibt es aber bereits Patches die schon vor der Ver\\u00f6ffentlichung eingespielt wurden, sofern man ein auto-update aktiviert hat.<\\\/span><\\\/p><p>Sehr zu empfehlen ist es daher generell bei Linux alle Pakete automatisch aktualisieren zu lassen sofern dieses m\\u00f6glich ist.<\\\/p><p>Originalmeldung bei <a href=\\\"https:\\\/\\\/blog.qualys.com\\\/vulnerabilities-research\\\/2021\\\/01\\\/26\\\/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Qualys im Blog<\\\/a><\\\/p>\",\"_ha_condition_list\":[{\"_id\":\"d2961ba\"}]},\"elements\":[],\"widgetType\":\"text-editor\"},{\"id\":\"31e8c5b\",\"elType\":\"widget\",\"settings\":{\"title\":\"Sicherheitshinweise der Distributionen\",\"_ha_condition_list\":[{\"_id\":\"6081b72\"}]},\"elements\":[],\"widgetType\":\"heading\"},{\"id\":\"c41308a\",\"elType\":\"widget\",\"settings\":{\"editor\":\"<ul class=\\\"rte__list rte__list--unordered\\\"><li><a href=\\\"https:\\\/\\\/security.archlinux.org\\\/CVE-2021-3156\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">Arch Linux Advisory zu CVE-2021-3156<\\\/a><\\\/li><li><a href=\\\"https:\\\/\\\/security-tracker.debian.org\\\/tracker\\\/CVE-2021-3156\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">Debian Security-Tracker<\\\/a><\\\/li><li><a href=\\\"https:\\\/\\\/lists.fedoraproject.org\\\/archives\\\/list\\\/package-announce@lists.fedoraproject.org\\\/message\\\/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY\\\/\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">Fedora 33: sudo-1.9.5p2-1.fc33<\\\/a><\\\/li><li><a href=\\\"https:\\\/\\\/bugs.freebsd.org\\\/bugzilla\\\/show_bug.cgi?id=253034\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">FreeBSD-Bugtracker<\\\/a><\\\/li><li><a href=\\\"https:\\\/\\\/security.gentoo.org\\\/glsa\\\/202101-33\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">Gentoo Linux Advisory<\\\/a><\\\/li><li><a href=\\\"https:\\\/\\\/access.redhat.com\\\/security\\\/cve\\\/CVE-2021-3156\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">Red Hat Customer Portal: RHEL-Updates<\\\/a><\\\/li><li><a href=\\\"https:\\\/\\\/www.suse.com\\\/support\\\/kb\\\/doc\\\/?id=000019841\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">SUSE Linux Enterprise Server<\\\/a><\\\/li><li><a href=\\\"https:\\\/\\\/ubuntu.com\\\/security\\\/CVE-2021-3156\\\" target=\\\"_blank\\\" rel=\\\"external noopener\\\">Ubuntu zu CVE-2021-3156<\\\/a><\\\/li><\\\/ul>\",\"_ha_condition_list\":[{\"_id\":\"0413c1f\"}]},\"elements\":[],\"widgetType\":\"text-editor\"}],\"isInner\":false}],\"isInner\":false},{\"id\":\"5fde191\",\"elType\":\"section\",\"settings\":{\"_ha_condition_list\":[{\"_id\":\"f64e142\"}]},\"elements\":[{\"id\":\"21c3f67\",\"elType\":\"column\",\"settings\":{\"_column_size\":100,\"_inline_size\":null,\"_ha_condition_list\":[{\"_id\":\"18a996d\"}]},\"elements\":[{\"id\":\"a2d9a62\",\"elType\":\"widget\",\"settings\":{\"video_type\":\"vimeo\",\"youtube_url\":\"https:\\\/\\\/www.youtube.com\\\/watch?v=XHOmBV4js_E\",\"vimeo_url\":\"https:\\\/\\\/vimeo.com\\\/504872555\",\"dailymotion_url\":\"https:\\\/\\\/www.dailymotion.com\\\/video\\\/x6tqhqb\",\"_ha_condition_list\":[{\"_id\":\"ff751e8\"}]},\"elements\":[],\"widgetType\":\"video\"}],\"isInner\":false}],\"isInner\":false}]","_elementor_css":{"time":1775925877,"fonts":[],"icons":[],"dynamic_elements_ids":[],"status":"file","0":""},"_elementor_conditions":null,"_happyaddons_elements_cache":[],"_oembed_75446120c39305f0da0ccd147f6de9cb":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">great job, everyone <a href=\"https:\/\/t.co\/22gooTH4sl\">pic.twitter.com\/22gooTH4sl<\/a><\/p>&mdash; crash override (@donk_enby) <a href=\"https:\/\/twitter.com\/donk_enby\/status\/1348484125825658887?ref_src=twsrc%5Etfw\">January 11, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_75446120c39305f0da0ccd147f6de9cb":"1611744877","_oembed_3efb2c3e76a18143e7207993a2a6939a":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BREAKING?src=hash&amp;ref_src=twsrc%5Etfw\">#BREAKING<\/a>: Texas takes the lead once more! Today, we\u2019re filing a lawsuit against <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\">#Google<\/a> for anticompetitive conduct.<br><br>This internet Goliath used its power to manipulate the market, destroy competition, and harm YOU, the consumer. Stay tuned\u2026 <a href=\"https:\/\/t.co\/fdEVEWQb0e\">pic.twitter.com\/fdEVEWQb0e<\/a><\/p>&mdash; Texas Attorney General (@TXAG) <a href=\"https:\/\/twitter.com\/TXAG\/status\/1339283520099856384?ref_src=twsrc%5Etfw\">December 16, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_3efb2c3e76a18143e7207993a2a6939a":"1611744877","_oembed_59808117857ddf57e478a31d79f76e4d":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Happy to follow-on report that a huge chunk of <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute just successfully made the transition to Graviton2 <a href=\"https:\/\/twitter.com\/Arm?ref_src=twsrc%5Etfw\">@ARM<\/a> in <a href=\"https:\/\/twitter.com\/awscloud?ref_src=twsrc%5Etfw\">@awscloud<\/a> this afternoon. More services coming shortly. My aim is to get to 100% of non-GPU <a href=\"https:\/\/twitter.com\/SmugMug?ref_src=twsrc%5Etfw\">@SmugMug<\/a> and <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute on ARM within the year. <a href=\"https:\/\/t.co\/fwXWdg06xx\">https:\/\/t.co\/fwXWdg06xx<\/a><\/p>&mdash; Don MacAskill (@DonMacAskill) <a href=\"https:\/\/twitter.com\/DonMacAskill\/status\/1314050996486561792?ref_src=twsrc%5Etfw\">October 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_59808117857ddf57e478a31d79f76e4d":"1611744877","_oembed_965c5b49aa8d22ce37dfb3bde0268600":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"de\" dir=\"ltr\">Der <a href=\"https:\/\/twitter.com\/hashtag\/Finanzausschuss?src=hash&amp;ref_src=twsrc%5Etfw\">#Finanzausschuss<\/a> im <a href=\"https:\/\/twitter.com\/hashtag\/Bundestag?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundestag<\/a> hat das <a href=\"https:\/\/twitter.com\/hashtag\/Jahressteuergesetz?src=hash&amp;ref_src=twsrc%5Etfw\">#Jahressteuergesetz<\/a> beschlossen. Damit wurde auch die <a href=\"https:\/\/twitter.com\/hashtag\/Gemeinn%C3%BCtzigkeit?src=hash&amp;ref_src=twsrc%5Etfw\">#Gemeinn\u00fctzigkeit<\/a> f\u00fcr <a href=\"https:\/\/twitter.com\/hashtag\/Freifunk?src=hash&amp;ref_src=twsrc%5Etfw\">#Freifunk<\/a> Initiativen beschlossen. Das ganze geht jetzt in der kommenden Woche ins Plenum zur Abstimmung und direkt in den <a href=\"https:\/\/twitter.com\/hashtag\/Bundesrat?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundesrat<\/a><\/p>&mdash; Jens Zimmermann (@JensZSPD) <a href=\"https:\/\/twitter.com\/JensZSPD\/status\/1336581821706989568?ref_src=twsrc%5Etfw\">December 9, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":"1611744878","_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1611744878","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":{"text-editor":{"count":2,"control_percent":0,"controls":{"content":{"section_editor":{"editor":2}}}},"heading":{"count":1,"control_percent":0,"controls":{"content":{"section_title":{"title":1}}}},"column":{"count":2,"control_percent":0,"controls":{"layout":{"layout":{"_inline_size":2}}}},"section":{"count":2,"control_percent":0,"controls":[]},"video":{"count":1,"control_percent":0,"controls":{"content":{"section_video":{"video_type":1,"vimeo_url":1}}}}},"_elementor_page_assets":{"scripts":["elementor-frontend"],"styles":["widget-heading","widget-video"]},"_elementor_screenshot_failed":null,"theplus_transient_widgets":null,"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"481","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["vpi error"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":[],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":"sudo","rank_math_og_content_image":null,"_yoast_wpseo_metadesc":null,"_yoast_wpseo_content_score":"60","_yoast_wpseo_focuskeywords":"[]","_yoast_wpseo_keywordsynonyms":"[\"\"]","_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"6546","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/posts\/6544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/comments?post=6544"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/posts\/6544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/media\/6546"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/media?parent=6544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/categories?post=6544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/ja\/wp-json\/wp\/v2\/tags?post=6544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}