Linux Audit: Buffer overflow A buffer overflow vulnerability in Linux Audit may allow local attackers to execute arbitrary code. audit 2008-07-31 2008-07-31 215705 local 1.7.3 1.7.3

Linux Audit is a set of userspace utilities for storing and processing auditing records.

A stack-based buffer overflow has been reported in the audit_log_user_command() function in the file lib/audit_logging.c when processing overly long arguments.

A local attacker could execute a specially crafted command on the host running Linux Audit, possibly resulting in the execution of arbitrary code with the privileges of the user running Linux Audit.

There is no known workaround at this time.

All Linux Audit users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=sys-process/audit-1.7.3"
CVE-2008-1628 p-y p-y