| Severity |
|
| Remote |
|
| Type |
| - |
Unknown |
| + |
Arbitrary filesystem access |
|
| Description |
| + |
A security issue was found in sudo before version 1.9.5. On a system with SELinux in permissive mode, an attacker could use sudoedit to change the ownership of arbitrary files by replacing a temporary file owned by an unprivileged user with a symlink to another file. |
|
| References |
| + |
https://www.openwall.com/lists/oss-security/2021/01/11/2 |
|
| Notes |
| + |
Workaround |
| + |
========== |
| + |
|
| + |
The issue is mitigated by the SELinux enforce mode or the kernel symbolic link protection (sysctl fs.protected_symlinks=1). |
|