Untrusted search path vulnerability in CMake before 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cmake | Kitware | 1.6.6 | 1.6.6 |
Cmake | Kitware | 2.0.0 | 2.0.0 |
Cmake | Kitware | 1.8.2 | 1.8.2 |
Cmake | Kitware | 1.6.7 | 1.6.7 |
Cmake | Kitware | 1.6.3 | 1.6.3 |
Cmake | Kitware | 1.6.0 | 1.6.0 |
Cmake | Kitware | 2.2.0 | 2.2.0 |
Cmake | Kitware | 1.4.3 | 1.4.3 |
Cmake | Kitware | 1.6.4 | 1.6.4 |
Cmake | Kitware | 2.0.5 | 2.0.5 |
Cmake | Kitware | 1.8.1 | 1.8.1 |
Cmake | Kitware | 1.4.6 | 1.4.6 |
Cmake | Kitware | 1.4.5 | 1.4.5 |
Cmake | Kitware | 2.0.4 | 2.0.4 |
Cmake | Kitware | 1.6.0_beta1 | 1.6.0_beta1 |
Cmake | Kitware | 1.8.3 | 1.8.3 |
Cmake | Kitware | 1.4.4 | 1.4.4 |
Cmake | Kitware | 1.6.1 | 1.6.1 |
Cmake | Kitware | 2.0.6 | 2.0.6 |
Cmake | Kitware | 1.8.0 | 1.8.0 |
Cmake | Kitware | 1.4.7 | 1.4.7 |
Cmake | Kitware | 2.0.3 | 2.0.3 |
Cmake | Kitware | 1.6.5 | 1.6.5 |
Cmake | Kitware | 1.6.2 | 1.6.2 |
Cmake | Kitware | 2.0.2 | 2.0.2 |
Cmake | Kitware | 1.6.0_beta2 | 1.6.0_beta2 |
Cmake | Kitware | 2.0.1 | 2.0.1 |