Логотип exploitDog
bind:"CVE-2021-23240"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-23240"

Количество 13

Количество 13

ubuntu логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2021-23240

почти 5 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a loc ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-q7hf-7qcc-gmg8

больше 3 лет назад

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

EPSS: Низкий
rocky логотип

RLSA-2021:1723

больше 4 лет назад

Low: sudo security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-1723

больше 4 лет назад

ELSA-2021-1723: sudo security and bug fix update (LOW)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0170-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0169-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0227-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0226-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0225-1

почти 5 лет назад

Security update for sudo

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
msrc логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-23240

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a loc ...

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
github логотип
GHSA-q7hf-7qcc-gmg8

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

0%
Низкий
больше 3 лет назад
rocky логотип
RLSA-2021:1723

Low: sudo security and bug fix update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-1723

ELSA-2021-1723: sudo security and bug fix update (LOW)

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0170-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0169-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0227-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0226-1

Security update for sudo

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0225-1

Security update for sudo

почти 5 лет назад

Уязвимостей на страницу