Logcheck: Root privilege escalation A vulnerability has been discovered in Logcheck's ebuilds which could allow for root privilege escalation. logcheck 2022-09-25 2022-09-25 630752 remote 1.3.23

Logcheck mails anomalies in the system logfiles to the administrator.

The pkg_postinst phase of the Logcheck ebuilds recursively chown the /etc/logcheck and /var/lib/logcheck directories. If the logcheck adds hardlinks to other files in these directories, the chown call will follow the link and transfer ownership of any file to the logcheck user.

A local attacker with access to the logcheck user could escalate to root privileges.

There is no known workaround at this time.

Gentoo has discontinued support for Logcheck. We recommend that users remove it:

# emerge --ask --depclean "app-admin/logcheck"
CVE-2017-20148 ajak ajak