vulnerability
Arch Linux: Privilege escalation (CVE-2019-25016)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Jan 28, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Jan 28, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A security issue has been found in OpenDoas before 6.8.1, where rules that allowed the user to execute any command would inherit the executing user's PATH instead of resetting it to a default PATH. Rules that limit the user to execute only a specific command are not affected by this and are only executed from the default PATH and with the PATH environment variable set to the safe default.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-25016
- https://attackerkb.com/topics/CVE-2019-25016
- URL-https://github.com/Duncaen/OpenDoas/commit/01c658f8c45cb92a343be5f32aa6da70b2032168
- URL-https://github.com/Duncaen/OpenDoas/commit/d5acd52e2a15c36a8e06f9103d35622933aa422d
- URL-https://github.com/Duncaen/OpenDoas/issues/45
- URL-https://github.com/Duncaen/OpenDoas/releases/tag/v6.8.1
- URL-https://security.archlinux.org/ASA-202102-8
- URL-https://security.gentoo.org/glsa/202107-11
- CWE-459
- CWE-909
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.