blob: 7f29c0cc9fa755a87cdf15285f9a6ea3db69e102 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200508-19">
<title>lm_sensors: Insecure temporary file creation</title>
lm_sensors is vulnerable to linking attacks, potentially allowing a local
user to overwrite arbitrary files.
<product type="ebuild">lm_sensors</product>
<announced>August 30, 2005</announced>
<revised>August 30, 2005: 01</revised>
<package name="sys-apps/lm_sensors" auto="yes" arch="*">
<unaffected range="ge">2.9.1-r1</unaffected>
<vulnerable range="lt">2.9.1-r1</vulnerable>
lm_sensors is a software package that provides drivers for
monitoring the temperatures, voltages, and fans of Linux systems with
hardware monitoring devices.
Javier Fernandez-Sanguino Pena has discovered that lm_sensors
insecurely creates temporary files with predictable filenames when
saving configurations.
<impact type="normal">
A local attacker could create symbolic links in the temporary file
directory, pointing to a valid file somewhere on the filesystem. When
the pwmconfig script of lm_sensors is executed, this would result in
the file being overwritten with the rights of the user running the
script, which typically is the root user.
There is no known workaround at this time.
All lm_sensors users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/lm_sensors-2.9.1-r1&quot;</code>
<uri link="">CAN-2005-2672</uri>
<metadata tag="requester" timestamp="Sat, 27 Aug 2005 09:37:19 +0000">
<metadata tag="bugReady" timestamp="Sat, 27 Aug 2005 09:38:55 +0000">
<metadata tag="submitter" timestamp="Sat, 27 Aug 2005 22:28:16 +0000">