I've recently noticed CVE-2010-0424 [1] listed in the cron list of
"possible security bugs". Yesterday I did a fast review of the bug
information (not that much available) and the fix introduced by the
Fedora guys (from cronie 1.4.3 to cronie 1.4.4) which is available at
[2].

>From what I can tell from the diff and comparing it to the crontab.c
code [3] in our own cron fork (based on the 3.0 codebase, not the 4.1)
I'm inclined to think that the CVE reference is not correct and our
cron package is NOT affected.

The problem seems to be related to the fact that in version 4.1, after
copying the crontab to the temporary file, the utime is modified and
set to 0 (as root). However, in version 3: the utime is not modified
but, rather, the utime of the temporary file is obtained when the
temporary file with the crontab is generated and then compared with
the utime of the crontab temporary file *after* being edited to
determine if something has changed.

Consequently, there is no operation there (no call to utime()) which
could be abused before cron drops its privileges to call the editor.

I would say that Debian is not affected by this issue, although I
would appreciate somebody to review the code and ratify that this is
correct.

Regards

Javier

[1] http://security-tracker.debian.org/tracker/CVE-2010-0424
[2] 
http://git.fedorahosted.org/git/cronie.git?p=cronie.git;a=commitdiff;h=9e4a8fa5f9171fb724981f53879c9b20264aeb61
[3] http://svn.debian.org/wsvn/pkg-cron/trunk/crontab.c

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-team

Reply via email to