A vulnerability in chrony may allow a privileged attacker to cause data loss via a symlink.
|Package||net-misc/chrony on all architectures|
|Affected versions||< 3.5.1|
|Unaffected versions||>= 3.5.1|
chrony is a versatile implementation of the Network Time Protocol (NTP).
It was found that chrony did not check whether its PID file was a symlink.
A local attacker could perform symlink attack(s) to overwrite arbitrary files with root privileges.
There is no known workaround at this time.
All chrony users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/chrony-3.5.1"
August 30, 2020
August 30, 2020: 1