Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-23240

Опубликовано: 12 янв. 2021
Источник: debian
EPSS Низкий

Описание

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.9.5-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2021/01/11/2

  • https://www.sudo.ws/repos/sudo/rev/8fcb36ef422a

  • https://www.sudo.ws/alerts/sudoedit_selinux.html

  • Neutralised by kernel hardening (fs.protected_symlinks = 1)

EPSS

Процентиль: 45%
0.00225
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
redhat
почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
nvd
почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
msrc
почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

github
больше 3 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

EPSS

Процентиль: 45%
0.00225
Низкий