Debian Security Advisory
DLA-2163-1 tinyproxy -- LTS security update
- Date Reported:
- 31 Mar 2020
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 870307, Bug 948283.
In Mitre's CVE dictionary: CVE-2017-11747.
- More information:
A minor security issue and a severe packaging bug have been fixed in tinyproxy, a lightweight http proxy daemon.
main.c in Tinyproxy created a /var/run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might have allowed local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executed a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.
Furthermore, a severe flaw had been discovered by Tim Duesterhus in Debian's init script for tinyproxy. With the tiny.conf configuration file having the PidFile option removed, the next run of logrotate (if installed) would have changed the owner of the system's base directory ("/") to tinyproxy:tinyproxy.
For Debian 8
Jessie, this problem has been fixed in version 1.8.3-3+deb8u1.
We recommend that you upgrade your tinyproxy packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS