opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2281-1 | opie security update |
EUVD |
EUVD-2011-2477 | opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:00:34.168Z
Reserved: 2011-06-15T00:00:00
Link: CVE-2011-2490
No data.
Status : Deferred
Published: 2011-07-27T02:55:02.087
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-2490
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD