| Summary: | cronie: fd leak in 1.4.8 (CVE-2012-6097) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | luigiwalser, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/534974/ | ||
| Whiteboard: | MGA2-32-OK, MGA2-64-OK | ||
| Source RPM: | cronie-1.4.8-5.1.mga2.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2013-01-11 06:25:56 CET
Fixed in r345483 (mga2, updates_testing, cronie-1.4.8-5.1.mga2)
Manuel Hiebel
2013-01-11 22:23:39 CET
Hardware:
i586 =>
All Can you give a Mageia advisory please Oden. Thanks. SRPM: cronie-1.4.8-5.1.mga2.src.rpm ----------------------------------- cronie-anacron cronie cronie-debug This is an extremely low-impact vulnerability, and would only affect systems where /etc/crontab wasn't world readable (as is the case in the msec secure level, for instance) and the sysadmin has made local modifications to the /etc/crontab file itself, and doesn't want users on the system to know about it. This sounds unlikely to affect anybody IMO. Here's the advisory text: It was reported that cronie 1.4.8 would leak certain file descriptors. On systems where /etc/crontab is not world-readable this could be an information disclosure concern (CVE-2012-6097). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6097 https://bugzilla.redhat.com/show_bug.cgi?id=893661 CC:
(none) =>
luigiwalser OpenSuSE has issued an advisory for this today (January 29): http://lists.opensuse.org/opensuse-updates/2013-01/msg00087.html URL:
(none) =>
http://lwn.net/Vulnerabilities/534974/
David Walser
2013-02-01 19:42:57 CET
Summary:
CVE-2012-6097: cronie: fd leak in 1.4.8 =>
cronie: fd leak in 1.4.8 (CVE-2012-6097) Testing info here: https://bugzilla.novell.com/show_bug.cgi?id=786096 tested successfully with description on i586 from #5: before update: Feb 3 19:15:01 MGA2_32BIT /USR/SBIN/CROND[8211]: (root) CMD ($HOME/lvm_cron) Feb 3 19:15:01 MGA2_32BIT /USR/SBIN/CROND[8210]: (root) CMDOUT (File descriptor 6 (/var/spool/cron) leaked on lvm2 invocation. Parent PID 8211: /bin/sh) Feb 3 19:15:01 MGA2_32BIT /USR/SBIN/CROND[8210]: (root) CMDOUT (File descriptor 7 (/etc/cron.d) leaked on lvm2 invocation. Parent PID 8211: /bin/sh) after update: Feb 3 19:17:01 MGA2_32BIT /USR/SBIN/CROND[8356]: (root) CMD ($HOME/lvm_cron) CC:
(none) =>
marc.lattemann cannot reproduce error message in mga2-64bit with old package. But no error message also for updated packages. Therefore validating? Whiteboard:
MGA2-32-OK =>
MGA2-32-OK, MGA2-64-OK
Marc Lattemann
2013-02-03 19:56:31 CET
Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0023 Status:
NEW =>
RESOLVED |