Summary: | <app-misc/tomboy-1.4.2-r1: Insecure LD_LIBRARY_PATH usage (CVE-2010-4005) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4005 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
![]() +*tomboy-1.4.2-r1 (26 Feb 2011) + + 26 Feb 2011; Pacho Ramos <pacho@gentoo.org> +tomboy-1.4.2-r1.ebuild, + +files/tomboy-1.4.2-insecure-path.patch: + Fix tomboy insecure LD_LIBRARY_PATH (CVE-2010-4005). + I am ok with CCing arches as soon as you need Thank you. Arches, please stabilize =app-misc/tomboy-1.4.2-r1 amd64 ok amd64 done. Thanks Agostino x86 stable ppc stable Thanks, everyone. GLSA request filed. CVE-2010-4005 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4005): The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2. Vulnerable versions were dropped long time ago This one is fixed as it seems. This issue was resolved and addressed in GLSA 201401-28 at http://security.gentoo.org/glsa/glsa-201401-28.xml by GLSA coordinator Sean Amoss (ackle). |