First published: Sat Dec 15 2007(Updated: )
etc-update in Portage before 2.1.3.11 on Gentoo Linux relies on the umask to set permissions for the merge file, often resulting in permissions weaker than those of the original files, which might allow local users to obtain sensitive information by reading the merge file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | ||
Gentoo Portage | <=2.1.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6249 is considered a moderate severity vulnerability due to its potential to expose sensitive information to local users.
To fix CVE-2007-6249, upgrade your Gentoo Portage to version 2.1.3.11 or later.
CVE-2007-6249 affects Gentoo Linux systems running versions of Portage prior to 2.1.3.11.
The impact of CVE-2007-6249 is that weak permissions on merge files may allow local users to read sensitive information unintentionally.
CVE-2007-6249 can be exploited by local users on affected systems who can access the merge files.