GLSA-200411-13 : Portage, Gentoolkit: Temporary file vulnerabilities

low Nessus Plugin ID 15647

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200411-13 (Portage, Gentoolkit: Temporary file vulnerabilities)

dispatch-conf and qpkg use predictable filenames for temporary files.
Impact :

A local attacker could create symbolic links in the temporary files directory, pointing to a valid file somewhere on the filesystem. When an affected script is called, this would result in the file to be overwritten with the rights of the user running the dispatch-conf or qpkg, which could be the root user.
Workaround :

There is no known workaround at this time.

Solution

All Portage users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=sys-apps/portage-2.0.51-r3' All Gentoolkit users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-portage/gentoolkit-0.2.0_pre8-r1'

See Also

https://security.gentoo.org/glsa/200411-13

Plugin Details

Severity: Low

ID: 15647

File Name: gentoo_GLSA-200411-13.nasl

Version: 1.18

Type: local

Published: 11/8/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:gentoolkit, p-cpe:/a:gentoo:linux:portage, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 11/7/2004

Vulnerability Publication Date: 11/7/2004

Reference Information

CVE: CVE-2004-1107, CVE-2004-1108

GLSA: 200411-13