From 814f4cf860e299a046b649eaee5463427984c09c Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Thu, 8 Jul 2021 15:03:58 +0100 Subject: gentoo resync : 08.07.2021 --- metadata/glsa/glsa-202107-11.xml | 47 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 metadata/glsa/glsa-202107-11.xml (limited to 'metadata/glsa/glsa-202107-11.xml') diff --git a/metadata/glsa/glsa-202107-11.xml b/metadata/glsa/glsa-202107-11.xml new file mode 100644 index 000000000000..33c7a57948fd --- /dev/null +++ b/metadata/glsa/glsa-202107-11.xml @@ -0,0 +1,47 @@ + + + + OpenDoas: Insufficient environment filtering + A vulnerability in OpenDoas could lead to privilege escalation. + doas + 2021-07-07 + 2021-07-07 + 767781 + local + + + 6.8.1 + 6.8.1 + + + +

OpenDoas allows users to run commands as other users.

+
+ +

OpenDoas does not properly filter the PATH variable from the resulting + shell after escalating privileges. +

+
+ +

A local attacker with control of a user’s PATH variable could escalate + privileges if that user uses OpenDoas with a poisoned PATH variable. +

+
+ +

There is no known workaround at this time.

+
+ +

All OpenDoas users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/doas-6.8.1" + + +
+ + CVE-2019-25016 + + ajak + ajak +
-- cgit v1.2.3