Gentoo: GLSA-202008-23: chrony: Symlink vulnerability
Summary
It was found that chrony did not check whether its PID file was a symlink.
Resolution
All chrony users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/chrony-3.5.1"
References
[ 1 ] CVE-2020-14367 https://nvd.nist.gov/vuln/detail/CVE-2020-14367 [ 2 ] chrony-3.5.1 release announcement https://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2020/08/msg00000.html
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202008-23
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Background
chrony is a versatile implementation of the Network Time Protocol (NTP).
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/chrony < 3.5.1 >= 3.5.1
Impact
===== A local attacker could perform symlink attack(s) to overwrite arbitrary files with root privileges.
Workaround
There is no known workaround at this time.