FS#54067 - [lynis] 2.4.8-1 CVE-2017-8108 Improper Link Resolution Before File Access
Attached to Project:
Community Packages
Opened by Hannes Dinter (cdo) - Monday, 15 May 2017, 18:16 GMT
Last edited by Levente Polyak (anthraxx) - Monday, 22 May 2017, 12:54 GMT
Opened by Hannes Dinter (cdo) - Monday, 15 May 2017, 18:16 GMT
Last edited by Levente Polyak (anthraxx) - Monday, 22 May 2017, 12:54 GMT
|
Details
Description:
Michael Scherer discovered that some Lynis tests reuse the same temporary file. As some tests remove the temporary file, this might give an attacker the possibility to perform a link following attack. While timing must be perfect, there is a very small time window in which the attack can recreate the temporary file and symlink it to another resource, like a file. In this case data may be overwritten, or possibly executed. [0] Affected version: * lynis<2.5.0 Resolution (according to [0]): * Upgrade to Lynis 2.5.0 or later. * Linux users may use sysctl and set both fs.protected_hardlinks=1 and fs.protected_symlinks=1, which may reduce the impact for this type of attack. Resources: [0] https://cisofy.com/security/cve/cve-2017-8108/ |
This task depends upon
Closed by Levente Polyak (anthraxx)
Monday, 22 May 2017, 12:54 GMT
Reason for closing: Fixed
Additional comments about closing: 2.5.0-1
Monday, 22 May 2017, 12:54 GMT
Reason for closing: Fixed
Additional comments about closing: 2.5.0-1
Can someone please submit this to https://security.archlinux.org/? It's not yet included there. Thanks!