A vulnerability has been found in fcron, allowing local attackers to conduct symlink attacks.
|Package||sys-process/fcron on all architectures|
|Affected versions||< 3.0.5-r2|
|Unaffected versions||>= 3.0.5-r2|
fcron is a periodic command scheduler for Unix-based systems
The fcrontab function contains a race condition relating to symlinks.
A local attacker could perform symlink attacks to read arbitrary files with the privileges of the user running the application.
There is no known workaround at this time.
All fcron users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-process/fcron-3.0.5-r2"
November 25, 2013
November 25, 2013: 1