{"id":"CVE-2021-23239","details":"The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.","modified":"2026-04-10T04:30:21.827279Z","published":"2021-01-12T09:15:14.043Z","related":["MGASA-2021-0042","SUSE-SU-2021:0225-1","SUSE-SU-2021:0226-1","SUSE-SU-2021:0227-1","SUSE-SU-2021:0232-1","openSUSE-SU-2021:0169-1","openSUSE-SU-2021:0170-1","openSUSE-SU-2024:11413-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE42Y35SMJOLONAIBNYNFC7J44UUZ2Y6/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMY4VSSBIND7VAYSN6T7XIWJRWG4GBB3/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00007.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202101-33"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210129-0010/"},{"type":"ADVISORY","url":"https://www.sudo.ws/stable.html#1.9.5"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2021-23239"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/millert/sudo","events":[{"introduced":"0"},{"fixed":"caa666c2dfa1f4286ccfbed5e512432665b72d3a"},{"introduced":"83d1bee918147a57804de77d3e1064a4e323f47e"},{"fixed":"10d072a320c885e2e805ef2e47fe7a2ebde68abc"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.8.32"},{"introduced":"1.9.0"},{"fixed":"1.9.5"}]}}],"versions":["SUDO_1_3_0","SUDO_1_3_1","SUDO_1_4_0","SUDO_1_5_0","SUDO_1_5_1","SUDO_1_5_2","SUDO_1_5_3","SUDO_1_5_4","SUDO_1_5_6","SUDO_1_5_7","SUDO_1_5_8","SUDO_1_5_9","SUDO_1_6_0","SUDO_1_6_1","SUDO_1_6_2","SUDO_1_6_3","SUDO_1_6_4","SUDO_1_6_5","SUDO_1_6_6","SUDO_1_6_7","SUDO_1_6_8","SUDO_1_6_8p1","SUDO_1_7_0","SUDO_1_7_1","SUDO_1_7_2","SUDO_1_8_0","SUDO_1_8_1","SUDO_1_8_10","SUDO_1_8_10p1","SUDO_1_8_10p2","SUDO_1_8_10p3","SUDO_1_8_11","SUDO_1_8_11p1","SUDO_1_8_11p2","SUDO_1_8_12","SUDO_1_8_13","SUDO_1_8_14","SUDO_1_8_14p1","SUDO_1_8_14p3","SUDO_1_8_15","SUDO_1_8_16","SUDO_1_8_17","SUDO_1_8_17p1","SUDO_1_8_18","SUDO_1_8_18p1","SUDO_1_8_19","SUDO_1_8_19p1","SUDO_1_8_19p2","SUDO_1_8_2","SUDO_1_8_20","SUDO_1_8_20p1","SUDO_1_8_20p2","SUDO_1_8_21","SUDO_1_8_21p1","SUDO_1_8_21p2","SUDO_1_8_22","SUDO_1_8_23","SUDO_1_8_24","SUDO_1_8_25","SUDO_1_8_25p1","SUDO_1_8_26","SUDO_1_8_27","SUDO_1_8_28","SUDO_1_8_28p1","SUDO_1_8_29","SUDO_1_8_3","SUDO_1_8_30","SUDO_1_8_31","SUDO_1_8_31p1","SUDO_1_8_31p2","SUDO_1_8_4","SUDO_1_8_4p1","SUDO_1_8_4p2","SUDO_1_8_4p3","SUDO_1_8_4p4","SUDO_1_8_4p5","SUDO_1_8_5","SUDO_1_8_5p1","SUDO_1_8_5p2","SUDO_1_8_5p3","SUDO_1_8_6","SUDO_1_8_6p1","SUDO_1_8_6p2","SUDO_1_8_6p3","SUDO_1_8_6p4","SUDO_1_8_6p5","SUDO_1_8_6p6","SUDO_1_8_6p7","SUDO_1_8_6p8","SUDO_1_8_7","SUDO_1_8_8","SUDO_1_8_9","SUDO_1_8_9p1","SUDO_1_8_9p2","SUDO_1_8_9p3","SUDO_1_8_9p4","SUDO_1_8_9p5","SUDO_1_9_0","SUDO_1_9_1","SUDO_1_9_2","SUDO_1_9_3","SUDO_1_9_3p1","SUDO_1_9_4","SUDO_1_9_4p1","SUDO_1_9_4p2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23239.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}