A buffer overflow vulnerability in Linux Audit may allow local attackers to execute arbitrary code.
|Package||sys-process/audit on all architectures|
|Affected versions||< 1.7.3|
|Unaffected versions||>= 1.7.3|
Linux Audit is a set of userspace utilities for storing and processing auditing records.
A stack-based buffer overflow has been reported in the audit_log_user_command() function in the file lib/audit_logging.c when processing overly long arguments.
A local attacker could execute a specially crafted command on the host running Linux Audit, possibly resulting in the execution of arbitrary code with the privileges of the user running Linux Audit.
There is no known workaround at this time.
All Linux Audit users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-process/audit-1.7.3"
July 31, 2008
July 31, 2008: 01