Valgrind: Untrusted search path An untrusted search path vulnerability in Valgrind might result in the execution of arbitrary code. valgrind 2009-02-12 2009-02-12 245317 local 3.4.0 3.4.0

Valgrind is an open-source memory debugger.

Tavis Ormandy reported that Valgrind loads a .valgrindrc file in the current working directory, executing commands specified there.

A local attacker could prepare a specially crafted .valgrindrc file and entice a user to run Valgrind from the directory containing that file, resulting in the execution of arbitrary code with the privileges of the user running Valgrind.

Do not run "valgrind" from untrusted working directories.

All Valgrind users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-util/valgrind-3.4.0"
CVE-2008-4865 rbu rbu rbu