Joined: 12 May 2004
|Posted: Thu Feb 12, 2009 10:26 pm Post subject: [ GLSA 200902-03 ] Valgrind: Untrusted search path
|Gentoo Linux Security Advisory
Title: Valgrind: Untrusted search path (GLSA 200902-03)
Date: February 12, 2009
An untrusted search path vulnerability in Valgrind might result in the execution of arbitrary code.
Valgrind is an open-source memory debugger.
Vulnerable: < 3.4.0
Unaffected: >= 3.4.0
Architectures: All supported architectures
Tavis Ormandy reported that Valgrind loads a .valgrindrc file in the current working directory, executing commands specified there.
A local attacker could prepare a specially crafted .valgrindrc file and entice a user to run Valgrind from the directory containing that file, resulting in the execution of arbitrary code with the privileges of the user running Valgrind.
Do not run "valgrind" from untrusted working directories.
All Valgrind users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-util/valgrind-3.4.0"