frysk packages through 2008-08-05 as shipped in Red Hat Enterprise Linux 5 are built with an insecure RPATH set in the ELF header of multiple binaries in /usr/bin/f* (e.g. fcore, fcatch, fstack, fstep, …) shipped in the package. A local attacker can exploit this vulnerability by running arbitrary code as another user.
[
{
"product": "frysk",
"vendor": "frysk",
"versions": [
{
"status": "affected",
"version": "through 2008-08-05"
}
]
}
]