• [gentoo-announce] [ GLSA 202405-13 ] borgmatic: Shell Injection

    From glsamaker@gentoo.org@21:1/5 to All on Sun May 5 10:00:02 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202405-13
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: borgmatic: Shell Injection
    Date: May 05, 2024
    Bugs: #924892
    ID: 202405-13

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in borgmatic, which can lead to
    shell injection.

    Background
    ==========

    borgmatic is simple, configuration-driven backup software for servers
    and workstations.

    Affected packages
    =================

    Package Vulnerable Unaffected
    -------------------- ------------ ------------
    app-backup/borgmatic < 1.8.8 >= 1.8.8

    Description
    ===========

    Prevent shell injection attacks within the PostgreSQL hook, the MongoDB
    hook, the SQLite hook, the "borgmatic borg" action, and command hook variable/constant interpolation.

    Impact
    ======

    Shell injection may be used in several borgmatic backends to execute
    arbitrary code.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All borgmatic users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-backup/borgmatic-1.8.8"

    References
    ==========


    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202405-13

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmY3O6cACgkQFMQkOaVy +9n5dw//R3RzlYWN1wT2DzN8WgeevZTuZXw8O6QfZs/KKSdXPHoGOrhA/nED91aL qtF5HZ0ewwj4pqmOeqPTGeAC+h48TBFzIU2SUGRAxmoR75lZMlbsROUrItUTWjVO /JeIpJEvFVy/QBwZIMATZuPoB4NzDh351SGHrRlYNQhBTmYGJqhyGQANUs+LZjsI zIxFgoSzH3HCbaoH7PFqUpqVhr+oG/huQCwSeHjJhdQoMNj3ucYRuc1XCojNZtxA SqjYIOvOrcVNE9Py14/8Hd6ouwEKTFIqxm9E5n/M0tMoi91AiJ5Q/VhB6J4AMFIT 0Zv666H+kxXigTzI+ngK6e6om1NXTpQ614b03sQ5L+n40JHA4AdnRp2UhKf12xpK KmxL0jwCJ4mtld19ccP4XDv1eH40tcBoubK/5ukGLCOQ8eHaPs54eTVMMVrNE0Sx mFcVRjNmjhKPVkSQGO1r5SLFLHgts5F5tsJr/TkIPU/YNaJgIkfMFegkVBD2SPuG y0wQfixrqgmK6rfB0pQwDlxiNvgvnkd6I/G/oPKhKHbneHl9uGswjaa7ut5luT2F mlgNvLbYU4hAmbYzETqHtvdsWNQlgi/y7s/+N3JiRRLVtwSWeUZ++giPr5Vx/bjI DVOQa88eU5tvVCCQuoCSreV7s4cuAD+MdRrMjvegO/DbJ6palxc=
    =YpPB
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)