Debian LTS: DLA-2163-1: tinyproxy security update

    Date 31 Mar 2020
    443
    Posted By LinuxSecurity Advisories
    A minor security issue and a severe packaging bug have been fixed in tinyproxy, a lightweight http proxy daemon.
    
    Package        : tinyproxy
    Version        : 1.8.3-3+deb8u1
    CVE ID         : CVE-2017-11747
    Debian Bug     : 870307 948283
    
    
    A minor security issue and a severe packaging bug have been fixed in
    tinyproxy, a lightweight http proxy daemon.
    
    CVE-2017-11747
    
      main.c in Tinyproxy created a /var/run/tinyproxy/tinyproxy.pid file
      after dropping privileges to a non-root account, which might have
      allowed local users to kill arbitrary processes by leveraging access
      to this non-root account for tinyproxy.pid modification before a root
      script executed a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.
    
    OTHER
    
      Furthermore, a severe flaw had been discovered by Tim Duesterhus in
      Debian's init script for tinyproxy. With the tiny.conf configuration
      file having the PidFile option removed, the next run of logrotate (if
      installed) would have changed the owner of the system's base directory
      ("/") to tinyproxy:tinyproxy.
    
    
    For Debian 8 "Jessie", this problem has been fixed in version
    1.8.3-3+deb8u1. These fixes were prepared by Mike Gabriel.
    
    We recommend that you upgrade your tinyproxy packages.
    
    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://wiki.debian.org/LTS
    
    
    Best,
    Utkarsh
    

    LinuxSecurity Poll

    Do you agree with Linus Torvalds' decision to reject the controversial patch mitigating the Snoop attack on Intel CPUs?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/28-do-you-agree-with-linus-torvalds-decision-to-reject-the-controversial-patch-mitigating-the-snoop-attack-on-intel-cpus?task=poll.vote&format=json
    28
    radio
    [{"id":"100","title":"Yes - this was undoubtedly the right decision.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"101","title":"Not sure...","votes":"1","type":"x","order":"2","pct":100,"resources":[]},{"id":"102","title":"No - he made a big mistake here.","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]