CVE-2017-11747 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11747): main.c in Tinyproxy 1.8.4 and earlier creates a /run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executes a "kill `cat /run/tinyproxy/tinyproxy.pid`" command. References: https://github.com/tinyproxy/tinyproxy/issues/106
The patch has been merged in upstream. Please bump. Michael Boyle Gentoo Security Padawan
Bumped to 1.10.0
@maintainer, please let us know when you want to stabilize.
We can stabilize this any time
@arches, please stabilize.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=55f51b2edc8883d92606e94feb667732d14d5dcb commit 55f51b2edc8883d92606e94feb667732d14d5dcb Author: Tobias Klausmann <klausman@gentoo.org> AuthorDate: 2018-11-27 16:00:55 +0000 Commit: Tobias Klausmann <klausman@gentoo.org> CommitDate: 2018-11-27 16:00:55 +0000 net-proxy/tinyproxy-1.10.0-r1: alpha stable Bug: http://bugs.gentoo.org/626628 Signed-off-by: Tobias Klausmann <klausman@gentoo.org> net-proxy/tinyproxy/tinyproxy-1.10.0-r1.ebuild | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
Stable on alpha.
x86 stable
ia64 stable
ppc stable
amd64 stable
tree is now clean.