user/chrony: CVE-2020-14367: PID file symlink attack
Bugzilla ID | 348 |
Alias(es) | CVE-2020-14367 |
Reporter | Max Rees (sroracle) |
Assignee | Max Rees (sroracle) |
Reported | 2020-09-04 16:19:29 -0500 |
Modified | 2020-09-04 16:19:29 -0500 |
Status | UNCONFIRMED |
Version | 1.0-RC1 |
Hardware | Adélie Linux / All |
Importance | --- / normal |
Package(s) | user/chrony |
URL | https://nvd.nist.gov/vuln/detail/CVE-2020-14367 |
Description
A flaw was found in chrony versions before 3.5.1 when creating the PID
file under the /var/run/chrony folder. The file is created during
chronyd startup while still running as the root user, and when it's
opened for writing, chronyd does not check for an existing symbolic
link with the same file name. This flaw allows an attacker with
privileged access to create a symlink with the default PID file name
pointing to any destination file in the system, resulting in data loss
and a denial of service due to the path traversal.
Fixed in >= 3.5.1 https://git.tuxfamily.org/chrony/chrony.git/commit/?id=f00fed20092b6a42283f29c6ee1f58244d74b545
Note that Adélie in its default configuration is not affected, since the pidfile defaults to /var/run/chronyd.pid in both /etc/init.d/chronyd and /etc/chrony/chrony.conf. /etc/conf.d/chronyd does not specify it.