SB2018020930 - Link following in Fedoraproject Fedora 



SB2018020930 - Link following in Fedoraproject Fedora

Published: February 9, 2018 Updated: August 8, 2020

Security Bulletin ID SB2018020930
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Link following (CVE-ID: CVE-2014-3219)

The vulnerability allows a local authenticated user to execute arbitrary code.

fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.


Remediation

Install update from vendor's website.