Joined: 12 May 2004
|Posted: Thu Jul 31, 2008 8:26 pm Post subject: [ GLSA 200807-14 ] Linux Audit: Buffer overflow
|Gentoo Linux Security Advisory
Title: Linux Audit: Buffer overflow (GLSA 200807-14)
Date: July 31, 2008
A buffer overflow vulnerability in Linux Audit may allow local attackers to
execute arbitrary code.
Linux Audit is a set of userspace utilities for storing and processing
Vulnerable: < 1.7.3
Unaffected: >= 1.7.3
Architectures: All supported architectures
A stack-based buffer overflow has been reported in the
audit_log_user_command() function in the file lib/audit_logging.c when
processing overly long arguments.
A local attacker could execute a specially crafted command on the host
running Linux Audit, possibly resulting in the execution of arbitrary
code with the privileges of the user running Linux Audit.
There is no known workaround at this time.
All Linux Audit users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-process/audit-1.7.3"
Last edited by GLSA on Wed Jun 12, 2013 4:28 am; edited 4 times in total