Computer Security
[EN] no-pyccku

Gentoo Linux Portage privilege escalation
SecurityVulns ID:9348
Threat Level:
Description:Relative shared library search path in suid application.
Affected:GENTOO : portage 2.1
CVE:CVE-2008-4394 (Multiple untrusted search path vulnerabilities in Portage before include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.)
Original documentdocumentGENTOO, [ GLSA 200810-02 ] Portage: Untrusted search path local root vulnerability (09.10.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod