Bug 570381 (CVE-2010-0792) - CVE-2010-0792 fcron: unauthorized disclosure of user crontabs
Summary: CVE-2010-0792 fcron: unauthorized disclosure of user crontabs
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-0792
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://web.nvd.nist.gov/view/vuln/det...
Whiteboard:
Depends On: 570382
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-03-04 05:12 UTC by Vincent Danen
Modified: 2019-09-29 12:35 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2010-06-25 09:55:17 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2010-03-04 05:12:30 UTC
Dan Rosenberg discovered several race condition vulnerabilities in fcrontab,
part of the fcron scheduler, that could allow a local attacker to use symbolic
links to read unauthorized files.  If fcrontab is installed setuid root, an 
attacker can read arbitrary files, but when installed with its own group (i.e.
'fcron'), an attacker can only read other non-root users' crontabs and fcron 
configuration files.

On Fedora, fcrontab is setuid fcron, which lessens the impact.

Upstream has released fcron 3.0.5 to correct this issue.

Comment 2 Fedora Update System 2010-03-08 13:11:57 UTC
fcron-3.0.5-1.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/fcron-3.0.5-1.fc13

Comment 3 Fedora Update System 2010-03-08 13:12:04 UTC
fcron-3.0.5-1.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/fcron-3.0.5-1.fc12

Comment 4 Fedora Update System 2010-03-27 01:01:07 UTC
fcron-3.0.5-1.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2010-04-01 17:18:53 UTC
fcron-3.0.5-1.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.