An untrusted search path vulnerability in Valgrind might result in the execution of arbitrary code.
|Package||dev-util/valgrind on all architectures|
|Affected versions||< 3.4.0|
|Unaffected versions||>= 3.4.0|
Valgrind is an open-source memory debugger.
Tavis Ormandy reported that Valgrind loads a .valgrindrc file in the current working directory, executing commands specified there.
A local attacker could prepare a specially crafted .valgrindrc file and entice a user to run Valgrind from the directory containing that file, resulting in the execution of arbitrary code with the privileges of the user running Valgrind.
Do not run "valgrind" from untrusted working directories.
All Valgrind users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-util/valgrind-3.4.0"
February 12, 2009
February 12, 2009: 01