Логотип exploitDog
bind:"CVE-2021-23239" OR bind:"CVE-2021-23240"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-23239" OR bind:"CVE-2021-23240"

Количество 21

Количество 21

rocky логотип

RLSA-2021:1723

больше 4 лет назад

Low: sudo security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-1723

больше 4 лет назад

ELSA-2021-1723: sudo security and bug fix update (LOW)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0170-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0169-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0227-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0226-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0225-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
ubuntu логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a loc ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2021-23239

почти 5 лет назад

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
EPSS: Низкий
redhat логотип

CVE-2021-23239

почти 5 лет назад

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
EPSS: Низкий
nvd логотип

CVE-2021-23239

почти 5 лет назад

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
EPSS: Низкий
msrc логотип

CVE-2021-23239

почти 5 лет назад

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
EPSS: Низкий
debian логотип

CVE-2021-23239

почти 5 лет назад

The sudoedit personality of Sudo before 1.9.5 may allow a local unpriv ...

CVSS3: 2.5
EPSS: Низкий
github логотип

GHSA-q7hf-7qcc-gmg8

больше 3 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

EPSS: Низкий
github логотип

GHSA-wfrc-r682-56qv

больше 3 лет назад

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
EPSS: Низкий
fstec логотип

BDU:2022-05782

почти 5 лет назад

Уязвимость команды sudoedit программы системного администрирования Sudo, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 2.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2021:1723

Low: sudo security and bug fix update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-1723

ELSA-2021-1723: sudo security and bug fix update (LOW)

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0170-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0169-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0227-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0226-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0225-1

Security update for sudo

почти 5 лет назад
ubuntu логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
msrc логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a loc ...

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2021-23239

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-23239

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-23239

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
0%
Низкий
почти 5 лет назад
msrc логотип
CVE-2021-23239

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-23239

The sudoedit personality of Sudo before 1.9.5 may allow a local unpriv ...

CVSS3: 2.5
0%
Низкий
почти 5 лет назад
github логотип
GHSA-q7hf-7qcc-gmg8

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-wfrc-r682-56qv

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS3: 2.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-05782

Уязвимость команды sudoedit программы системного администрирования Sudo, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 2.5
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу