First published: Tue Jan 12 2021(Updated: )
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo Project Sudo | <1.8.32 | |
Sudo Project Sudo | >=1.9.0<1.9.5 | |
netapp hci management node | ||
netapp solidfire | ||
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23240 is a vulnerability in sudoedit in Sudo before 1.9.5 that allows a local unprivileged user to gain file ownership and escalate privileges.
CVE-2021-23240 affects SELinux RBAC support in permissive mode by allowing the user to replace a temporary file with a symlink to an arbitrary file target, gaining file ownership and escalating privileges.
Versions of Sudo before 1.9.5 are affected by CVE-2021-23240.
Machines without SELinux are not affected by CVE-2021-23240.
CVE-2021-23240 has a severity rating of 7.8 (high).
The Common Weakness Enumeration (CWE) ID for CVE-2021-23240 is 59.
You can find more information about CVE-2021-23240 at the following references: [1] [2] [3]