Joined: 12 May 2004
|Posted: Thu Nov 17, 2016 10:26 am Post subject: [ GLSA 201611-10 ] libuv
|Gentoo Linux Security Advisory
Title: libuv: Privilege escalation (GLSA 201611-10)
Exploitable: local, remote
Date: November 17, 2016
A vulnerability in libuv could lead to privilege escalation.
libuv is a multi-platform support library with a focus on asynchronous
Vulnerable: < 1.4.2
Unaffected: >= 1.4.2
Architectures: All supported architectures
It was discovered that libuv does not call setgroups before calling
setuid/setgid. If this is not called, then even though the uid has been
dropped, there may still be groups associated that permit superuser
Context-dependent attackers could escalate privileges via unspecified
There is no known workaround at this time.
All libuv users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --verbose --oneshot ">=dev-libs/libuv-1.4.2"