GNU TeXmacs: Privilege escalation A vulnerability in GNU TeXmacs could result in privilege escalation. texmacs 2014-01-26 2014-01-26 337532 local 1.0.7.2-r1 1.0.7.2-r1

GNU TeXmacs is a free WYSIWYG editing platform with special features for scientists.

The texmacs and tm_mupad_help scripts in TeXmacs place a zero-length directory name in the LD_LIBRARY_PATH, which might result in the current working directory (.) to be included when searching for dynamically linked libraries.

A local attacker could gain escalated privileges via a specially crafted shared library.

There is no known workaround at this time.

All GNU TeXmacs users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-office/texmacs-1.0.7.2-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 02, 2011. It is likely that your system is already no longer affected by this issue.

CVE-2010-3394 underling Zlogene