Arch Linux 754 Published by

An opendoas security update has been released for Arch Linux.



Arch Linux Security Advisory ASA-202102-8
=========================================

Severity: High
Date : 2021-02-06
CVE-ID : CVE-2019-25016
Package : opendoas
Type : privilege escalation
Remote : No
Link :   https://security.archlinux.org/AVG-1504

Summary
=======

The package opendoas before version 6.8.1-2 is vulnerable to privilege
escalation.

Resolution
==========

Upgrade to 6.8.1-2.

# pacman -Syu "opendoas>=6.8.1-2"

The problem has been fixed upstream in version 6.8.1.

Workaround
==========

None.

Description
===========

A security issue has been found in OpenDoas before 6.8.1, where rules
that allowed the user to execute any command would inherit the
executing user's PATH instead of resetting it to a default PATH. Rules
that limit the user to execute only a specific command are not affected
by this and are only executed from the default PATH and with the PATH
environment variable set to the safe default.

Impact
======

A local user might be able to escalate privileges.

References
==========

  https://github.com/Duncaen/OpenDoas/releases/tag/v6.8.1
  https://github.com/Duncaen/OpenDoas/issues/45
  https://github.com/Duncaen/OpenDoas/commit/d5acd52e2a15c36a8e06f9103d35622933aa422d.patch
  https://gitlab.alpinelinux.org/alpine/aports/-/blob/9e259950190c924b4a17825aad2d7cee87fbd75b/main/doas/reset-path.patch
  https://security.archlinux.org/CVE-2019-25016