summaryrefslogtreecommitdiff
blob: 373507d71916915978cd56c429b02ab62a3528cc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200501-43">
  <title>f2c: Insecure temporary file creation</title>
  <synopsis>
    f2c is vulnerable to symlink attacks, potentially allowing a local user to
    overwrite arbitrary files.
  </synopsis>
  <product type="ebuild">f2c</product>
  <announced>2005-01-30</announced>
  <revised count="01">2005-01-30</revised>
  <bug>79725</bug>
  <access>local</access>
  <affected>
    <package name="dev-lang/f2c" auto="yes" arch="*">
      <unaffected range="ge">20030320-r1</unaffected>
      <vulnerable range="le">20030320</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    f2c is a Fortran to C translator. Portage uses this package in
    some ebuilds to build Fortran sources.
    </p>
  </background>
  <description>
    <p>
    Javier Fernandez-Sanguino Pena from the Debian Security Audit Team
    discovered that f2c creates temporary files in world-writeable
    directories with predictable names.
    </p>
  </description>
  <impact type="normal">
    <p>
    A local attacker could create symbolic links in the temporary
    files directory, pointing to a valid file somewhere on the filesystem.
    When f2c is executed, this would result in the file being overwritten
    with the rights of the user running the software, which could be the
    root user.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All f2c users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=dev-lang/f2c-20030320-r1"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0017">CAN-2005-0017</uri>
  </references>
  <metadata tag="submitter" timestamp="2005-01-29T12:00:55Z">
    koon
  </metadata>
  <metadata tag="bugReady" timestamp="2005-01-29T16:13:04Z">
    vorlon078
  </metadata>
</glsa>