On Tue, 12 May 2009 16:53:41 -0500, Jamie Strandboge wrote:
> Package: cron
> Version: 3.0pl1-105
> Severity: grave
> Tags: patch security
> Justification: user security hole
> User: ubuntu-de...@lists.ubuntu.com
> Usertags: origin-ubuntu jaunty ubuntu-patch
> 
> Hi,
> 
> I was reviewing a list of old bugs in the Ubuntu bug tracker, and came across:
> https://bugs.edge.launchpad.net/ubuntu/+source/cron/+bug/46649
> 
> I then reviewed the Ubuntu and Debian packages and found that while the most
> serious issue of not checking setuid() was addressed in 3.0pl1-64, checks for
> setgid() and initgroups() were not added. Other distributions (eg Gentoo and
> RedHat) fixed these calls as well. I was then curious to see when these
> two calls could fail and found that sys_setgid can fail via LSM and
> CAP_SETGID and sys_setgroups() can fail via LSM, CAP_SETGID,
> NGROUPS_MAX, and ENOMEM. As such, Ubuntu plans to release a fix for this
> in our stable releases with the following changelog:
> 
>   * SECURITY UPDATE: cron does not check the return code of setgid() and
>     initgroups(), which under certain circumstances could cause applications
>     to run with elevated group privileges. Note that the more serious issue
>     of not checking the return code of setuid() was fixed in 3.0pl1-64.
>     (LP: #46649)
>     - do_command.c: check return code of setgid() and initgroups()
>     - CVE-2006-2607
> 
> We thought you might be interested in doing the same.

thanks for submitting this report.  this is very helpful and a great
step toward better collaboration on security issues!

mike



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to