Gentoo Archives: gentoo-announce

From: Sean Amoss <ackle@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201401-28 ] Tomboy: Privilege escalation
Date: Sun, 26 Jan 2014 01:31:05
Message-Id: 52E464B0.5000101@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201401-28
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Tomboy: Privilege escalation
9 Date: January 26, 2014
10 Bugs: #356583
11 ID: 201401-28
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in Tomboy could result in privilege escalation.
19
20 Background
21 ==========
22
23 Tomboy is a desktop note-taking application.
24
25 Affected packages
26 =================
27
28 -------------------------------------------------------------------
29 Package / Vulnerable / Unaffected
30 -------------------------------------------------------------------
31 1 app-misc/tomboy < 1.4.2-r1 >= 1.4.2-r1
32
33 Description
34 ===========
35
36 Tomboy places a zero-length directory name in the LD_LIBRARY_PATH,
37 which might result in the current working directory (.) to be included
38 when searching for dynamically linked libraries.
39
40 NOTE: This vulnerability exists due to an incomplete fix for
41 CVE-2005-4790 (GLSA 200711-12).
42
43 Impact
44 ======
45
46 A local attacker could gain escalated privileges via a specially
47 crafted shared library.
48
49 Workaround
50 ==========
51
52 There is no known workaround at this time.
53
54 Resolution
55 ==========
56
57 All Tomboy users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=app-misc/tomboy-1.4.2-r1"
61
62 NOTE: This is a legacy GLSA. Updates for all affected architectures are
63 available since March 02, 2011. It is likely that your system is
64 already no longer affected by this issue.
65
66 References
67 ==========
68
69 [ 1 ] CVE-2010-4005
70 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4005
71 [ 2 ] GLSA 200711-12
72 http://www.gentoo.org/security/en/glsa/glsa-200711-12.xml
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-201401-28.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users' machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 https://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2014 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature