DescriptionSlackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote attackers to execute arbitrary code with root privileges.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
llvm-2.9source(unstable)(not affected)
llvm-3.0source(unstable)(not affected)
llvm-3.1source(unstable)(not affected)
llvm-toolchain-3.2source(unstable)(not affected)
llvm-toolchain-3.3source(unstable)(not affected)
llvm-toolchain-3.4source(unstable)(not affected)
llvm-toolchain-snapshotunknown(unstable)(not affected)


- llvm-2.9 <not-affected> (RPATH issue slackware specific)
- llvm-3.0 <not-affected> (RPATH issue slackware specific)
- llvm-3.1 <not-affected> (RPATH issue slackware specific)
- llvm-toolchain-3.2 <not-affected> (RPATH issue slackware specific)
- llvm-toolchain-3.3 <not-affected> (RPATH issue slackware specific)
- llvm-toolchain-3.4 <not-affected> (RPATH issue slackware specific)
- llvm-toolchain-snapshot <not-affected> (RPATH issue slackware specific)

Search for package or bug name: Reporting problems