Gentoo: lv arbitrary command execution vulnerability
Summary
GENTOO LINUX SECURITY ANNOUNCEMENT 200305-07
Previous versions of lv read the file .lv in the current directory. Becuse this file could be created by other users and could contain malicious commands to execute upon viewing certain files this is considered a potential local root exploit.
SOLUTION
It is recommended that all Gentoo Linux users who are running app-text/lv upgrade to lv-4.49.5 as follows
emerge sync emerge lv emerge clean
aliz@gentoo.org - GnuPG key is available at nakano@gentoo.org
Resolution
References
Availability
Concerns
Background