fcron: Information disclosure — GLSA 201311-16

A vulnerability has been found in fcron, allowing local attackers to conduct symlink attacks.

Affected packages

sys-process/fcron on all architectures
Affected versions < 3.0.5-r2
Unaffected versions >= 3.0.5-r2

Background

fcron is a periodic command scheduler for Unix-based systems

Description

The fcrontab function contains a race condition relating to symlinks.

Impact

A local attacker could perform symlink attacks to read arbitrary files with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All fcron users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-process/fcron-3.0.5-r2"
 

References

Release date
November 25, 2013

Latest revision
November 25, 2013: 1

Severity
low

Exploitable
local

Bugzilla entries