ArchLinux: 201705-20: lynis: arbitrary file overwrite
Summary
Michael Scherer discovered that some Lynis tests reuse the same temporary file. As some tests remove the temporary file, this might give an attacker the possibility to perform a link following attack. While timing must be perfect, there is a very small time window in which the attack can recreate the temporary file and symlink it to another resource, like a file. In this case data may be overwritten, or possibly executed.
Resolution
Upgrade to 2.5.0-1.
# pacman -Syu "lynis>=2.5.0-1"
The problem has been fixed upstream in version 2.5.0.
References
https://bugs.archlinux.org/task/54067 https://cisofy.com/security/cve/cve-2017-8108/ https://security.archlinux.org/CVE-2017-8108
Workaround
None.