Unrated severityNVD Advisory· Published Nov 16, 2005· Updated Apr 16, 2026
CVE-2005-3581
CVE-2005-3581
Description
GDAL before 1.3.0-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.
Affected products
7cpe:2.3:a:gdal:gdal:1.2.5:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:gdal:gdal:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gdal:gdal:1.2.5_r1:*:*:*:*:*:*:*
- cpe:2.3:a:gdal:gdal:1.2.6_r1:*:*:*:*:*:*:*
- cpe:2.3:a:gdal:gdal:1.2.6_r2:*:*:*:*:*:*:*
- cpe:2.3:a:gdal:gdal:1.2.6_r3:*:*:*:*:*:*:*
- cpe:2.3:a:gdal:gdal:1.2.6_r4:*:*:*:*:*:*:*
- cpe:2.3:a:gdal:gdal:1.3.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- secunia.com/advisories/17427/nvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200511-02.xmlnvdPatchVendor Advisory
- www.osvdb.org/20529nvd
- www.securityfocus.com/bid/15120nvd
- www.vupen.com/english/advisories/2005/2281nvd
News mentions
0No linked articles in our index yet.