A vulnerability in chrony may allow a privileged attacker to cause data loss via a symlink.
Package | net-misc/chrony on all architectures |
---|---|
Affected versions | < 3.5.1 |
Unaffected versions | >= 3.5.1 |
chrony is a versatile implementation of the Network Time Protocol (NTP).
It was found that chrony did not check whether its PID file was a symlink.
A local attacker could perform symlink attack(s) to overwrite arbitrary files with root privileges.
There is no known workaround at this time.
All chrony users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/chrony-3.5.1"
Release date
August 30, 2020
Latest revision
August 30, 2020: 1
Severity
normal
Exploitable
local
Bugzilla entries