Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Arbitrary filesystem access |
|
Description |
+ |
A security issue was found in sudo before version 1.9.5. On a system with SELinux in permissive mode, an attacker could use sudoedit to change the ownership of arbitrary files by replacing a temporary file owned by an unprivileged user with a symlink to another file. |
|
References |
+ |
https://www.openwall.com/lists/oss-security/2021/01/11/2 |
|
Notes |
+ |
Workaround |
+ |
========== |
+ |
|
+ |
The issue is mitigated by the SELinux enforce mode or the kernel symbolic link protection (sysctl fs.protected_symlinks=1). |
|