From 3cf27339901a7ca15df33f6ea134daa93888d5d0 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Wed, 3 May 2023 17:26:08 +0100 Subject: gentoo auto-resync : 03:05:2023 - 17:26:08 --- metadata/glsa/glsa-202305-14.xml | 42 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 metadata/glsa/glsa-202305-14.xml (limited to 'metadata/glsa/glsa-202305-14.xml') diff --git a/metadata/glsa/glsa-202305-14.xml b/metadata/glsa/glsa-202305-14.xml new file mode 100644 index 000000000000..f42e1eb0ac47 --- /dev/null +++ b/metadata/glsa/glsa-202305-14.xml @@ -0,0 +1,42 @@ + + + + uptimed: Root Privilege Escalation + A vulnerability has been discovered in uptimed which could result in root privilege escalation. + uptimed + 2023-05-03 + 2023-05-03 + 630810 + remote + + + 0.4.6-r1 + 0.4.6-r1 + + + +

uptimed is a system uptime record daemon that keeps track of your highest uptimes.

+
+ +

Via unnecessary file ownership modifications in the pkg_postinst ebuild phase, the uptimed user could change arbitrary files to be owned by the uptimed user at emerge-time.

+
+ +

The uptimed user could achieve root privileges when the uptimed package is emerged.

+
+ +

There is no known workaround at this time.

+
+ +

All uptimed users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-misc/uptimed-0.4.6-r1" + +
+ + CVE-2020-36657 + + ajak + sam +
\ No newline at end of file -- cgit v1.2.3