Re: [chrony-dev] chrony 3.5.1 and PATH_MAX

[ Thread Index | Date Index | More chrony.tuxfamily.org/chrony-dev Archives ]


On Mon, Aug 24, 2020 at 07:03:51PM +0200, Matthias Andree wrote:
> At any rate, I set the "discovery" date to the first relevant commit here:
> <https://vuxml.freebsd.org/freebsd/719f06af-e45e-11ea-95a1-c3b8167b8026.html>
> 
> However is 2020-08-06 the real date that the symlink vulnerability was
> discovered (or a bug understood as vulnerability), or was that some
> earlier date?

I received the report on 2020-08-05. I knew what a symlink attack is
in general, but I didn't realize it applied to the chronyd's pidfile
and its own user. The reason why it was already fixed in the
development code was that there was a need for opening file with
restricted permissions (to avoid leaking the NTS keys) and all fopen()
calls were switched to the new function.

-- 
Miroslav Lichvar


-- 
To unsubscribe email chrony-dev-request@xxxxxxxxxxxxxxxxxxxx with "unsubscribe" in the subject.
For help email chrony-dev-request@xxxxxxxxxxxxxxxxxxxx with "help" in the subject.
Trouble?  Email listmaster@xxxxxxxxxxxxxxxxxxxx.


Mail converted by MHonArc 2.6.19+ http://listengine.tuxfamily.org/