First published: Fri Dec 16 2005(Updated: )
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | =5.8.0 | |
Perl | =5.4 | |
Perl | =5.5 | |
Perl | =5.8.4.2 | |
Perl | <=5.8.6 | |
Perl | =5.8.4 | |
Perl | =5.6.1 | |
Perl | =5.8.4.5 | |
Perl | =5.8.4.3 | |
Perl | =5.5.3 | |
Perl | =5.3 | |
Perl | =5.8.4.2.3 | |
Perl | =5.8.1 | |
Perl | =5.4.5 | |
Perl | =5.8.4.1 | |
Perl | =5.8.4.4 | |
Perl | =5.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.