lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200605252012.k4PKCUG9008525@lambchop.rdu.rpath.com>
Date: Thu May 25 21:12:48 2006
From: jmforbes at rpath.com (Justin M. Forbes)
Subject: rPSA-2006-0082-2 vixie-cron

rPath Security Advisory: 2006-0082-2
Published: 2006-05-25
Updated:
    2006-05-25 Reference the assigned CVE number
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
    Local Root Deterministic Privilege Escalation
Updated Versions:
    vixie-cron=/conary.rpath.com@rpl:devel//1/4.1-5.2-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607
    http://bugs.rpath.com/show_bug.cgi?id=1166

Description:
    In previous versions of the vixie-cron package, when the
    /etc/security/limits.conf file has been set up with limits for
    any user, and that user has permission to use the cron facility,
    that user can use vixie-cron to run arbitrary programs as root by
    exceeding the limits set in /etc/security/limits.conf.
    
    By default, rPath Linux does not include any limits configured
    in the /etc/security/limits.conf file.  The /etc/security/limits.conf
    file is provided by the pam:data component, so to determine whether
    it has been changed in any way, run the command:
    
    # conary verify pam:data | grep /etc/security/limits.conf

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ