Gentoo Portage through 2.3.84 allows local users to place a Trojan horse plugin in the /usr/lib64/nagios/plugins directory by leveraging access to the nagios user account, because this directory is writable in between a call to emake and a call to fowners.
References
Link | Resource |
---|---|
https://bugs.gentoo.org/692492 | Exploit Issue Tracking Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/01/21/1 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-01-20 16:15
Updated : 2021-07-21 04:39
NVD link : CVE-2019-20384
Mitre link : CVE-2019-20384
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
gentoo
- portage