UBUNTU-CVE-2021-23240

Source
https://ubuntu.com/security/CVE-2021-23240
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-23240.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-23240
Related
Published
2021-01-12T09:15:00Z
Modified
2024-10-15T14:08:02Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

selinuxeditcopy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

References

Affected packages

Ubuntu:Pro:14.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.6p3-0ubuntu3
1.8.8-2ubuntu1
1.8.8-2ubuntu2
1.8.9p4-1ubuntu1
1.8.9p4-1ubuntu2
1.8.9p5-1ubuntu1
1.8.9p5-1ubuntu1.1
1.8.9p5-1ubuntu1.2
1.8.9p5-1ubuntu1.3
1.8.9p5-1ubuntu1.4
1.8.9p5-1ubuntu1.5+esm1
1.8.9p5-1ubuntu1.5+esm2
1.8.9p5-1ubuntu1.5+esm3
1.8.9p5-1ubuntu1.5+esm5
1.8.9p5-1ubuntu1.5+esm6
1.8.9p5-1ubuntu1.5+esm7

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}

Ubuntu:Pro:16.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.12-1ubuntu3
1.8.16-0ubuntu1
1.8.16-0ubuntu1.1
1.8.16-0ubuntu1.2
1.8.16-0ubuntu1.3
1.8.16-0ubuntu1.4
1.8.16-0ubuntu1.5
1.8.16-0ubuntu1.6
1.8.16-0ubuntu1.7
1.8.16-0ubuntu1.8
1.8.16-0ubuntu1.9
1.8.16-0ubuntu1.10
1.8.16-0ubuntu1.10+esm1
1.8.16-0ubuntu1.10+esm2

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}

Ubuntu:Pro:18.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.20p2-1ubuntu1
1.8.21p2-2ubuntu1
1.8.21p2-3ubuntu1
1.8.21p2-3ubuntu1.1
1.8.21p2-3ubuntu1.2
1.8.21p2-3ubuntu1.3
1.8.21p2-3ubuntu1.4
1.8.21p2-3ubuntu1.5
1.8.21p2-3ubuntu1.6

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}

Ubuntu:20.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.27-1ubuntu4
1.8.29-1ubuntu1
1.8.31-1ubuntu1
1.8.31-1ubuntu1.1
1.8.31-1ubuntu1.2
1.8.31-1ubuntu1.4
1.8.31-1ubuntu1.5

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}

Ubuntu:22.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.9-1ubuntu2

Affected versions

1.*

1.9.5p2-3ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "negligible",
    "binaries": [
        {
            "binary_version": "1.9.9-1ubuntu2",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.9.9-1ubuntu2",
            "binary_name": "sudo-dbgsym"
        },
        {
            "binary_version": "1.9.9-1ubuntu2",
            "binary_name": "sudo-ldap"
        },
        {
            "binary_version": "1.9.9-1ubuntu2",
            "binary_name": "sudo-ldap-dbgsym"
        }
    ]
}