A vulnerability in OpenDoas could lead to privilege escalation.
Package | app-admin/doas on all architectures |
---|---|
Affected versions | < 6.8.1 |
Unaffected versions | >= 6.8.1 |
OpenDoas allows users to run commands as other users.
OpenDoas does not properly filter the PATH variable from the resulting shell after escalating privileges.
A local attacker with control of a user’s PATH variable could escalate privileges if that user uses OpenDoas with a poisoned PATH variable.
There is no known workaround at this time.
All OpenDoas users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/doas-6.8.1"
Release date
July 07, 2021
Latest revision
July 07, 2021: 1
Severity
normal
Exploitable
local
Bugzilla entries