Mandriva Linux Security Advisory : readline (MDVSA-2014:154)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated readline packages fix security vulnerability :

Steve Kemp discovered the _rl_tropen() function in readline insecurely
handled a temporary file. This could allow a local attacker to perform
symbolic link attacks (CVE-2014-2524).

Also, upstream patches have been added to fix an infinite loop in vi
input mode, and to fix an issue with slowness when pasting text.

See also :

http://advisories.mageia.org/MGASA-2014-0319.html

Solution :

Update the affected lib64readline-devel, lib64readline6 and / or
readline-doc packages.

Risk factor :

Low / CVSS Base Score : 3.3
(CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 2.9
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 77042 ()

Bugtraq ID: 66369

CVE ID: CVE-2014-2524

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now