From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-200505-14.xml | 65 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 65 insertions(+) create mode 100644 glsa-200505-14.xml (limited to 'glsa-200505-14.xml') diff --git a/glsa-200505-14.xml b/glsa-200505-14.xml new file mode 100644 index 00000000..615774fb --- /dev/null +++ b/glsa-200505-14.xml @@ -0,0 +1,65 @@ + + + + + + + Cheetah: Untrusted module search path + + Cheetah contains a vulnerability in the module importing code that can + allow a local user to gain escalated privileges. + + Cheetah + May 19, 2005 + May 17, 2006: 02 + 92926 + local + + + 0.9.17_rc1 + 0.9.17_rc1 + + + +

+ Cheetah is a Python powered template engine and code generator. +

+
+ +

+ Brian Bird discovered that Cheetah searches for modules in the + world-writable /tmp directory. +

+
+ +

+ A malicious local user could place a module containing arbitrary code + in /tmp, which when imported would run with escalated privileges. +

+
+ +

+ There are no known workarounds at this time. +

+
+ +

+ All Cheetah users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/cheetah-0.9.17_rc1" +
+ + Secunia Advisory SA15386 + + + jaervosz + + + r2d2 + + + koon + +
-- cgit v1.2.3-65-gdbad