blob: ec106f47b5185d317c6311fc7f5f27e794565712 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200606-07">
<title>Vixie Cron: Privilege Escalation</title>
Vixie Cron allows local users to execute programs as root.
<product type="ebuild">vixie-cron</product>
<announced>June 09, 2006</announced>
<revised>June 09, 2006: 01</revised>
<package name="sys-process/vixie-cron" auto="yes" arch="*">
<unaffected range="ge">4.1-r9</unaffected>
<vulnerable range="lt">4.1-r9</vulnerable>
Vixie Cron is a command scheduler with extended syntax over cron.
Roman Veretelnikov discovered that Vixie Cron fails to properly
check whether it can drop privileges accordingly if setuid() in
do_command.c fails due to a user exceeding assigned resource limits.
<impact type="high">
Local users can execute code with root privileges by deliberately
exceeding their assigned resource limits and then starting a command
through Vixie Cron. This requires resource limits to be in place on the
There is no known workaround at this time.
All Vixie Cron users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=sys-process/vixie-cron-4.1-r9&quot;</code>
<uri link="">CVE-2006-2607</uri>
<metadata tag="requester" timestamp="Wed, 07 Jun 2006 19:26:16 +0000">
<metadata tag="submitter" timestamp="Wed, 07 Jun 2006 20:17:38 +0000">
<metadata tag="bugReady" timestamp="Fri, 09 Jun 2006 03:56:58 +0000">