Debian Security Advisory

DLA-2163-1 tinyproxy -- LTS security update

Date Reported:
31 Mar 2020
Affected Packages:
tinyproxy
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 870307, Bug 948283.
In Mitre's CVE dictionary: CVE-2017-11747.
More information:

A minor security issue and a severe packaging bug have been fixed in tinyproxy, a lightweight http proxy daemon.

  • CVE-2017-11747

    main.c in Tinyproxy created a /var/run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might have allowed local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executed a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.

    OTHER

    Furthermore, a severe flaw had been discovered by Tim Duesterhus in Debian's init script for tinyproxy. With the tiny.conf configuration file having the PidFile option removed, the next run of logrotate (if installed) would have changed the owner of the system's base directory ("/") to tinyproxy:tinyproxy.

    For Debian 8 Jessie, this problem has been fixed in version 1.8.3-3+deb8u1.

    We recommend that you upgrade your tinyproxy packages.

    Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS