sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by /home///file.txt.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Sudo | Sudo_project | * | 1.8.14 (including) |
| Sudo | Ubuntu | esm-infra-legacy/trusty | * |
| Sudo | Ubuntu | precise | * |
| Sudo | Ubuntu | precise/esm | * |
| Sudo | Ubuntu | trusty | * |
| Sudo | Ubuntu | trusty/esm | * |
| Sudo | Ubuntu | upstream | * |
| Sudo | Ubuntu | vivid | * |
| Sudo | Ubuntu | vivid/stable-phone-overlay | * |
| Sudo | Ubuntu | vivid/ubuntu-core | * |
| Sudo | Ubuntu | wily | * |