Computer Security
[EN] securityvulns.ru no-pyccku


Gentoo Linux Portage privilege escalation
Published:09.10.2008
Source:
SecurityVulns ID:9348
Type:local
Threat Level:
6/10
Description:Relative shared library search path in suid application.
Affected:GENTOO : portage 2.1
CVE:CVE-2008-4394 (Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.)
Original documentdocumentGENTOO, [ GLSA 200810-02 ] Portage: Untrusted search path local root vulnerability (09.10.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod