CVE-2021-23240 log
Source |
|
Severity | High |
Remote | No |
Type | Arbitrary filesystem access |
Description | A security issue was found in sudo before version 1.9.5. On a system with SELinux in permissive mode, an attacker could use sudoedit to change the ownership of arbitrary files by replacing a temporary file owned by an unprivileged user with a symlink to another file. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1432 | sudo | 1.9.4.p2-2 | 1.9.5.p1-1 | High | Not affected |
References |
---|
https://www.openwall.com/lists/oss-security/2021/01/11/2 https://www.sudo.ws/alerts/sudoedit_selinux.html https://www.sudo.ws/repos/sudo/rev/8fcb36ef422a |
Notes |
---|
Workaround ========== The issue is mitigated by the SELinux enforce mode or the kernel symbolic link protection (sysctl fs.protected_symlinks=1). |