OpenDoas: Insufficient environment filtering — GLSA 202107-11

A vulnerability in OpenDoas could lead to privilege escalation.

Affected packages

app-admin/doas on all architectures
Affected versions < 6.8.1
Unaffected versions >= 6.8.1

Background

OpenDoas allows users to run commands as other users.

Description

OpenDoas does not properly filter the PATH variable from the resulting shell after escalating privileges.

Impact

A local attacker with control of a user’s PATH variable could escalate privileges if that user uses OpenDoas with a poisoned PATH variable.

Workaround

There is no known workaround at this time.

Resolution

All OpenDoas users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/doas-6.8.1"
 

References

Release date
July 07, 2021

Latest revision
July 07, 2021: 1

Severity
normal

Exploitable
local

Bugzilla entries