A vulnerability has been found in fcron, allowing local attackers to conduct symlink attacks.
| Package | sys-process/fcron on all architectures | 
|---|---|
| Affected versions | < 3.0.5-r2 | 
| Unaffected versions | >= 3.0.5-r2 | 
fcron is a periodic command scheduler for Unix-based systems
The fcrontab function contains a race condition relating to symlinks.
A local attacker could perform symlink attacks to read arbitrary files with the privileges of the user running the application.
There is no known workaround at this time.
All fcron users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-process/fcron-3.0.5-r2"
      Release date
      
      November 25, 2013
    
      Latest revision
      
      November 25, 2013: 1
    
      Severity
      
      low
    
      Exploitable
      
      local
    
Bugzilla entries