CVE-2021-23239

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-23239
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23239.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-23239
Downstream
Related
Published
2021-01-12T09:15:14Z
Modified
2025-10-28T04:06:40.887797Z
Severity
  • 2.5 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

References

Affected packages

Git / github.com/millert/sudo

Affected ranges

Type
GIT
Repo
https://github.com/millert/sudo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Git / github.com/sudo-project/sudo

Affected ranges

Type
GIT
Repo
https://github.com/sudo-project/sudo
Events

Affected versions

Other

SUDO_1_9_0
SUDO_1_9_1
SUDO_1_9_2
SUDO_1_9_3
SUDO_1_9_3p1
SUDO_1_9_4
SUDO_1_9_4p1
SUDO_1_9_4p2

v1.*

v1.9.0
v1.9.1
v1.9.2
v1.9.3
v1.9.3p1
v1.9.4
v1.9.4p1
v1.9.4p2