Mageia 2021-0042: sudo security update
Mageia 2021-0042: sudo security update
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. (CVE-2021-23239).
MGASA-2021-0042 - Updated sudo packages fix security vulnerabilities Publication date: 17 Jan 2021 URL: https://advisories.mageia.org/MGASA-2021-0042.html Type: security Affected Mageia releases: 7 CVE: CVE-2021-23239, CVE-2021-23240 The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. (CVE-2021-23239). selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable. (CVE-2021-23240). References: - https://bugs.mageia.org/show_bug.cgi?id=28067 - https://www.openwall.com/lists/oss-security/2021/01/11/2 - https://www.sudo.ws/stable.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240 SRPMS: - 7/core/sudo-1.9.5-1.mga7