chrony: Symlink vulnerability — GLSA 202008-23

A vulnerability in chrony may allow a privileged attacker to cause data loss via a symlink.

Affected packages

net-misc/chrony on all architectures
Affected versions < 3.5.1
Unaffected versions >= 3.5.1

Background

chrony is a versatile implementation of the Network Time Protocol (NTP).

Description

It was found that chrony did not check whether its PID file was a symlink.

Impact

A local attacker could perform symlink attack(s) to overwrite arbitrary files with root privileges.

Workaround

There is no known workaround at this time.

Resolution

All chrony users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/chrony-3.5.1"
 

References

Release date
August 30, 2020

Latest revision
August 30, 2020: 1

Severity
normal

Exploitable
local

Bugzilla entries