Gentoo Logo

Shorewall : Insecure temp file handling


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200407-07 / Shorewall
Release Date July 08, 2004
Latest Revision May 22, 2006: 02
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
net-firewall/shorewall <= 1.4.10c >= 1.4.10f All supported architectures

Related bugreports: #55675


Shorewall contains a bug in the code handling the creation of temporary files and directories. This can allow a non-root user to overwrite arbitrary system files.

2.  Impact Information


Shorewall is a high level tool for configuring Netfilter, the firewall facility included in the Linux Kernel.


Shorewall uses temporary files and directories in an insecure manner. A local user could create symbolic links at specific locations, eventually overwriting other files on the filesystem with the rights of the shorewall process.


An attacker could exploit this vulnerability to overwrite arbitrary system files with root privileges, resulting in Denial of Service or further exploitation.

3.  Resolution Information


There is no known workaround at this time. All users should upgrade to the latest available version of Shorewall.


All users should upgrade to the latest available version of Shorewall, as follows:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=net-firewall/shorewall-1.4.10f"
# emerge ">=net-firewall/shorewall-1.4.10f"

4.  References


Page updated July 08, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.