Gentoo: man arbitrary code execution
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200303-13 - - ---------------------------------------------------------------------
- - ---------------------------------------------------------------------
- From advisory:
"man 1.5l was released today, fixing a bug which results in arbitrary code execution upon reading a specially formatted man file. The basic problem is, upon finding a string with a quoting problem, the function my_xsprintf in util.c will return "unsafe" (rather than returning a string which could be interpreted by the shell). This return value is passed directly to system(3) - meaning if there is any program named `unsafe`, it will execute with the privs of the user."
Read the full advisory at: http://marc.theaimsgroup.com/?l=bugtraq&m=104740927915154&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running sys-apps/man upgrade to man-1.5l as follows:
emerge sync emerge man e...Read the Full Advisory
Resolution
References
Availability
Concerns
Background