Debian LTS: DLA-1723-1: cron security update

    Date21 Mar 2019
    CategoryDebian LTS
    410
    Posted ByLinuxSecurity Advisories
    Various security problems have been discovered in Debian's CRON scheduler. CVE-2017-9525
    Package        : cron
    Version        : 3.0pl1-127+deb8u2
    CVE ID         : CVE-2017-9525 CVE-2019-9704 CVE-2019-9705 CVE-2019-9706
    Debian Bug     : 809167
    
    
    Various security problems have been discovered in Debian's CRON scheduler.
    
    CVE-2017-9525
    
        Fix group crontab to root escalation via the Debian package's
        postinst script as described by Alexander Peslyak (Solar Designer) in
        http://www.openwall.com/lists/oss-security/2017/06/08/3
    
    
    CVE-2019-9704
    
        DoS: Fix unchecked return of calloc(). Florian Weimer discovered that
        a missing check for the return value of calloc() could crash the
        daemon, which could be triggered by a very large crontab created by a
        user.
    
    
    CVE-2019-9705
    
        Enforce maximum crontab line count of 1000 to prevent a malicious
        user from creating an excessivly large crontab. The daemon will log a
        warning for existing files, and crontab(1) will refuse to create new
        ones.
    
    
    CVE-2019-9706
    
        A user reported a use-after-free condition in the cron daemon,
        leading to a possible Denial-of-Service scenario by crashing the
        daemon. 
    
    
    For Debian 8 "Jessie", these problems have been fixed in version
    3.0pl1-127+deb8u2.
    
    We recommend that you upgrade your cron packages.
    
    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://wiki.debian.org/LTS
    
    -- 
    
    mike gabriel aka sunweaver (Debian Developer)
    fon: +49 (1520) 1976 148
    
    GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
    mail: This email address is being protected from spambots. You need JavaScript enabled to view it., http://sunweavers.net
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.