GLSA-200807-14 : Linux Audit: Buffer overflow
Medium Nessus Plugin ID 33780
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200807-14 (Linux Audit: Buffer overflow)
A stack-based buffer overflow has been reported in the audit_log_user_command() function in the file lib/audit_logging.c when processing overly long arguments.
A local attacker could execute a specially crafted command on the host running Linux Audit, possibly resulting in the execution of arbitrary code with the privileges of the user running Linux Audit.
There is no known workaround at this time.
SolutionAll Linux Audit users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=sys-process/audit-1.7.3'