vulnerability: rewrite arbitrary user file

Bug #607328 reported by Vasily Kulikov
This bug affects 1 person
Affects Status Importance Assigned to Milestone
feh (Debian)
Fix Released
feh (Ubuntu)

Bug Description

Binary package hint: feh

Hi, I've just discovered that feh is vulnerable to rewriting any user file:

      tmpname_timestamper =
         estrjoin("", "/tmp/feh_", cppid, "_", basename, NULL);
            execlp("wget", "wget", "-N", "-O", tmpname_timestamper, newurl,
                   quiet, (char*) NULL);

If attacker knows PID of feh and knows the URL, it can create the link to any user file. wget would overwrite it.


Revision history for this message
Kees Cook (kees) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better.

The latest release of Ubuntu is not vulnerable to symlink race attack, but earlier release will need fixing.

Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information:

visibility: private → public
Changed in feh (Ubuntu):
status: New → Confirmed
importance: Undecided → Low
Changed in feh (Debian):
status: Unknown → New
Changed in feh (Debian):
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.