Privilege escalation vulnerability in Qt-UnixODBC on Gentoo Linux

Privilege escalation vulnerability in Qt-UnixODBC on Gentoo Linux

CVE-2005-4279 · HIGH Severity

AV:L/AC:L/AU:N/C:C/I:C/A:C

Untrusted search path vulnerability in Qt-UnixODBC before 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.

Learn more about our Cis Benchmark Audit For Debian Family Linux.