Описание
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home///file.txt."
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 1.8.16-0ubuntu1 |
| bionic | not-affected | 1.8.16-0ubuntu1 |
| cosmic | not-affected | 1.8.16-0ubuntu1 |
| devel | not-affected | 1.8.16-0ubuntu1 |
| disco | not-affected | 1.8.16-0ubuntu1 |
| eoan | not-affected | 1.8.16-0ubuntu1 |
| esm-infra-legacy/trusty | ignored | |
| esm-infra/bionic | not-affected | 1.8.16-0ubuntu1 |
| esm-infra/focal | not-affected | 1.8.16-0ubuntu1 |
| esm-infra/xenial | not-affected | 1.8.16-0ubuntu1 |
Показывать по
EPSS
7.2 High
CVSS2
Связанные уязвимости
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
sudoedit in Sudo before 1.8.15 allows local users to gain privileges v ...
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
EPSS
7.2 High
CVSS2