OpenDKIM: Root privilege escalation — GLSA 201904-22

A vulnerability was discovered in Gentoo's ebuild for OpenDKIM which could lead to root privilege escalation.

Affected packages

mail-filter/opendkim on all architectures
Affected versions < 2.10.3-r8
Unaffected versions >= 2.10.3-r8

Background

A community effort to develop and maintain a C library for producing DKIM-aware applications and an open source milter for providing DKIM service.

Description

It was discovered that Gentoo’s OpenDKIM ebuild does not properly set permissions or place the pid file in a safe directory.

Impact

A local attacker could escalate privileges.

Workaround

Users should ensure the proper permissions are set as discussed in the referenced bugs.

Resolution

All OpenDKIM users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-filter/opendkim-2.10.3-r8"
 

References

Release date
April 22, 2019

Latest revision
April 22, 2019: 1

Severity
normal

Exploitable
remote

Bugzilla entries