Summary: | sys-apps/fcron: Multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Luke Macken (RETIRED) <lewk> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | cron-bugs+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
Whiteboard: | A3 [glsa] lewk | ||
Package list: | Runtime testing required: | --- |
Description
Luke Macken (RETIRED)
![]() cron herd, Please bump stable branch to 2.0.2. The dev branch has also been bumped to 2.9.5.1 to fix this issue. I was going to do these bumps before going to work, but looks like one of the patches doesn't apply cleanly, so I'll have to take a look at it while at work tonight, and will bump these first thing in the morning. 2.0.2 and 2.5.9.1 are in CVS. 2.0.2 marked stable on x86. Could the CC'd archs please mark 2.0.2 stable? The following versions are vulnerable and will be removed as soon as all archs mark 2.0.2 stable: 2.0.0-r4, 2.0.1, 2.9.4, and 2.9.5. the check for a valid EDITOR doesn't work: * Attempting to deduce absolute path of !!! ERROR: sys-apps/fcron-2.0.2 failed. !!! Function pkg_setup, Line 30, Exitcode 0 !!! Please set the EDITOR env variable to the path of a valid executable. !!! If you need support, post the topmost build error, NOT this status message. blubb@aqua ~/gentoo/gentoo-x86/sys-apps/fcron $ echo $EDITOR /usr/bin/vim of course /usr/bin/vim is executable both stable on ppc sparc stable. blubb, are you sure there's nothing wrong on your end? I must've built fcron a couple dozen times last night with various EDITOR settings, and it always worked as expected. I've talked to both the sparc and ppc devs that tested it, and they didn't have any problems. I'm trying to figure out how [[ "${EDITOR}" != */* ]] could ever fail if EDITOR="/usr/bin/vim". That's the only way it would ever get to the rest of pkg_setup. if i emerge it as root, it works :) seems like the problem is my sudo-entry for emerge. stable on amd64 Stable on mips. It might be a good idea to get verification for the possible impact (elevation of privileges, DoS) as described in the Analysis section of the advisory. Does issue 2 allow one to file cronjobs which will be run as root for example? cron team, can you comment? btw,... Secunia: http://secunia.com/advisories/13209/ SecurityTracker: http://securitytracker.com/alerts/2004/Nov/1012239.html OSVDB: #11834..11837 Debian Bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=281436 Looking at it I see no obvious way of elevating privs. Looks like Local/Normal (A3) to me. 2.0.2 is stable on hppa and vulnerable versions have been removed. Mathias, I agree with Koon wrt to root escalation. Doesn't look very probable, but of course anything is possible. As far as DoS and the other stuff mentioned in the Analysis section, I'd say most certainly. GLSA 200411-27 |