Unrated severityNVD Advisory· Published Dec 16, 2005· Updated Apr 16, 2026
CVE-2005-4278
CVE-2005-4278
Description
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Affected products
17cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*range: <=5.8.6
- cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.