fbida is vulnerable to linking attacks, potentially allowing a local user to overwrite arbitrary files.
Package | media-gfx/fbida on all architectures |
---|---|
Affected versions | < 2.03-r3 |
Unaffected versions | >= 2.03-r3 |
fbida is a collection of image viewers and editors for the framebuffer console and X11.
Jan Braun has discovered that the "fbgs" script provided by fbida insecurely creates temporary files in the "/var/tmp" directory.
A local attacker could create links in the temporary file directory, pointing to a valid file somewhere on the filesystem. When an affected script is called, this could result in the file being overwritten with the rights of the user running the script.
There is no known workaround at this time.
All fbida users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-gfx/fbida-2.03-r3"
Release date
April 23, 2006
Latest revision
April 23, 2006: 01
Severity
normal
Exploitable
local
Bugzilla entries