Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-2607 (GCVE-0-2006-2607)
Vulnerability from cvelistv5
Published
2006-05-25 20:00
Modified
2024-08-07 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:58:51.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060525 rPSA-2006-0082-1 vixie-cron", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" }, { "name": "ADV-2006-2075", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2075" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "name": "18108", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18108" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "name": "20388", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20388" }, { "name": "1016480", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016480" }, { "name": "USN-778-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/778-1/" }, { "name": "SUSE-SA:2006:027", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "name": "35318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35318" }, { "name": "21032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21032" }, { "name": "GLSA-200606-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "name": "oval:org.mitre.oval:def:10213", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "name": "vixie-cron-docommand-gain-privilege(26691)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "name": "RHSA-2006:0539", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "name": "20616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20616" }, { "name": "21702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21702" }, { "name": "20380", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20380" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060525 rPSA-2006-0082-1 vixie-cron", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" }, { "name": "ADV-2006-2075", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2075" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "name": "18108", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18108" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "name": "20388", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20388" }, { "name": "1016480", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016480" }, { "name": "USN-778-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/778-1/" }, { "name": "SUSE-SA:2006:027", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "name": "35318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35318" }, { "name": "21032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21032" }, { "name": "GLSA-200606-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "name": "oval:org.mitre.oval:def:10213", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "name": "vixie-cron-docommand-gain-privilege(26691)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "name": "RHSA-2006:0539", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "name": "20616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20616" }, { "name": "21702", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21702" }, { "name": "20380", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20380" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060525 rPSA-2006-0082-1 vixie-cron", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" }, { "name": "ADV-2006-2075", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2075" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "name": "18108", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18108" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=134194", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "name": "20388", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20388" }, { "name": "1016480", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016480" }, { "name": "USN-778-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/778-1/" }, { "name": "SUSE-SA:2006:027", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "name": "35318", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35318" }, { "name": "21032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21032" }, { "name": "GLSA-200606-07", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "name": "oval:org.mitre.oval:def:10213", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "name": "vixie-cron-docommand-gain-privilege(26691)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "name": "RHSA-2006:0539", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "name": "20616", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20616" }, { "name": "21702", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21702" }, { "name": "20380", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20380" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2607", "datePublished": "2006-05-25T20:00:00", "dateReserved": "2006-05-25T00:00:00", "dateUpdated": "2024-08-07T17:58:51.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-2607\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-05-25T20:02:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paul_vixie:vixie_cron:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F661927-058A-4F4C-8E0A-DA031A9E85B5\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=134194\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20380\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20388\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20616\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21032\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21702\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35318\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200606-07.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016480\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006-05-32.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0539.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/435033/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/18108\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2075\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26691\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/778-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=134194\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21702\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200606-07.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006-05-32.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0539.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/435033/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/18108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/26691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/778-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}]}}" } }
RHSA-2006:0539
Vulnerability from csaf_redhat
Published
2006-07-12 18:13
Modified
2024-11-22 00:19
Summary
Red Hat Security Advisory: vixie-cron security update
Notes
Topic
Updated vixie-cron packages that fix a privilege escalation issue are now
available.
This update has been rated as having important security impact by the Red Hat
Security Response Team.
Details
The vixie-cron package contains the Vixie version of cron. Cron is a
standard UNIX daemon that runs specified programs at scheduled times.
A privilege escalation flaw was found in the way Vixie Cron runs programs;
vixie-cron does not properly verify an attempt to set the current process
user id succeeded. It was possible for a malicious local users who
exhausted certain limits to execute arbitrary commands as root via cron.
(CVE-2006-2607)
All users of vixie-cron should upgrade to these updated packages, which
contain a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated vixie-cron packages that fix a privilege escalation issue are now\navailable.\n\nThis update has been rated as having important security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The vixie-cron package contains the Vixie version of cron. Cron is a\nstandard UNIX daemon that runs specified programs at scheduled times.\n\nA privilege escalation flaw was found in the way Vixie Cron runs programs;\nvixie-cron does not properly verify an attempt to set the current process\nuser id succeeded. It was possible for a malicious local users who\nexhausted certain limits to execute arbitrary commands as root via cron.\n(CVE-2006-2607)\n\nAll users of vixie-cron should upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0539", "url": "https://access.redhat.com/errata/RHSA-2006:0539" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "193146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193146" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0539.json" } ], "title": "Red Hat Security Advisory: vixie-cron security update", "tracking": { "current_release_date": "2024-11-22T00:19:39+00:00", "generator": { "date": "2024-11-22T00:19:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0539", "initial_release_date": "2006-07-12T18:13:00+00:00", "revision_history": [ { "date": "2006-07-12T18:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:19:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.ia64", "product": { "name": "vixie-cron-4:4.1-44.EL4.ia64", "product_id": "vixie-cron-4:4.1-44.EL4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=ia64\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=ia64\u0026epoch=4" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.src", "product": { "name": "vixie-cron-4:4.1-44.EL4.src", "product_id": "vixie-cron-4:4.1-44.EL4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.x86_64", "product": { "name": "vixie-cron-4:4.1-44.EL4.x86_64", "product_id": "vixie-cron-4:4.1-44.EL4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.i386", "product": { "name": "vixie-cron-4:4.1-44.EL4.i386", "product_id": "vixie-cron-4:4.1-44.EL4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=i386\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=i386\u0026epoch=4" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.ppc", "product": { "name": "vixie-cron-4:4.1-44.EL4.ppc", "product_id": "vixie-cron-4:4.1-44.EL4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=ppc\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=ppc\u0026epoch=4" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.s390x", "product": { "name": "vixie-cron-4:4.1-44.EL4.s390x", "product_id": "vixie-cron-4:4.1-44.EL4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=s390x\u0026epoch=4" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.s390", "product": { "name": "vixie-cron-4:4.1-44.EL4.s390", "product_id": "vixie-cron-4:4.1-44.EL4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=s390\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=s390\u0026epoch=4" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2607", "discovery_date": "2006-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193146" } ], "notes": [ { "category": "description", "text": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.", "title": "Vulnerability description" }, { "category": "summary", "text": "Jobs start from root when pam_limits enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:vixie-cron-4:4.1-44.EL4.i386", "4AS:vixie-cron-4:4.1-44.EL4.ia64", "4AS:vixie-cron-4:4.1-44.EL4.ppc", "4AS:vixie-cron-4:4.1-44.EL4.s390", "4AS:vixie-cron-4:4.1-44.EL4.s390x", "4AS:vixie-cron-4:4.1-44.EL4.src", "4AS:vixie-cron-4:4.1-44.EL4.x86_64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-4:4.1-44.EL4.src", "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-4:4.1-44.EL4.i386", "4ES:vixie-cron-4:4.1-44.EL4.ia64", "4ES:vixie-cron-4:4.1-44.EL4.ppc", "4ES:vixie-cron-4:4.1-44.EL4.s390", "4ES:vixie-cron-4:4.1-44.EL4.s390x", "4ES:vixie-cron-4:4.1-44.EL4.src", "4ES:vixie-cron-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-4:4.1-44.EL4.i386", "4WS:vixie-cron-4:4.1-44.EL4.ia64", "4WS:vixie-cron-4:4.1-44.EL4.ppc", "4WS:vixie-cron-4:4.1-44.EL4.s390", "4WS:vixie-cron-4:4.1-44.EL4.s390x", "4WS:vixie-cron-4:4.1-44.EL4.src", "4WS:vixie-cron-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2607" }, { "category": "external", "summary": "RHBZ#193146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2607", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2607" } ], "release_date": "2006-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-12T18:13:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:vixie-cron-4:4.1-44.EL4.i386", "4AS:vixie-cron-4:4.1-44.EL4.ia64", "4AS:vixie-cron-4:4.1-44.EL4.ppc", "4AS:vixie-cron-4:4.1-44.EL4.s390", "4AS:vixie-cron-4:4.1-44.EL4.s390x", "4AS:vixie-cron-4:4.1-44.EL4.src", "4AS:vixie-cron-4:4.1-44.EL4.x86_64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-4:4.1-44.EL4.src", "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-4:4.1-44.EL4.i386", "4ES:vixie-cron-4:4.1-44.EL4.ia64", "4ES:vixie-cron-4:4.1-44.EL4.ppc", "4ES:vixie-cron-4:4.1-44.EL4.s390", "4ES:vixie-cron-4:4.1-44.EL4.s390x", "4ES:vixie-cron-4:4.1-44.EL4.src", "4ES:vixie-cron-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-4:4.1-44.EL4.i386", "4WS:vixie-cron-4:4.1-44.EL4.ia64", "4WS:vixie-cron-4:4.1-44.EL4.ppc", "4WS:vixie-cron-4:4.1-44.EL4.s390", "4WS:vixie-cron-4:4.1-44.EL4.s390x", "4WS:vixie-cron-4:4.1-44.EL4.src", "4WS:vixie-cron-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0539" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Jobs start from root when pam_limits enabled" } ] }
rhsa-2006:0539
Vulnerability from csaf_redhat
Published
2006-07-12 18:13
Modified
2024-11-22 00:19
Summary
Red Hat Security Advisory: vixie-cron security update
Notes
Topic
Updated vixie-cron packages that fix a privilege escalation issue are now
available.
This update has been rated as having important security impact by the Red Hat
Security Response Team.
Details
The vixie-cron package contains the Vixie version of cron. Cron is a
standard UNIX daemon that runs specified programs at scheduled times.
A privilege escalation flaw was found in the way Vixie Cron runs programs;
vixie-cron does not properly verify an attempt to set the current process
user id succeeded. It was possible for a malicious local users who
exhausted certain limits to execute arbitrary commands as root via cron.
(CVE-2006-2607)
All users of vixie-cron should upgrade to these updated packages, which
contain a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated vixie-cron packages that fix a privilege escalation issue are now\navailable.\n\nThis update has been rated as having important security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The vixie-cron package contains the Vixie version of cron. Cron is a\nstandard UNIX daemon that runs specified programs at scheduled times.\n\nA privilege escalation flaw was found in the way Vixie Cron runs programs;\nvixie-cron does not properly verify an attempt to set the current process\nuser id succeeded. It was possible for a malicious local users who\nexhausted certain limits to execute arbitrary commands as root via cron.\n(CVE-2006-2607)\n\nAll users of vixie-cron should upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0539", "url": "https://access.redhat.com/errata/RHSA-2006:0539" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "193146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193146" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0539.json" } ], "title": "Red Hat Security Advisory: vixie-cron security update", "tracking": { "current_release_date": "2024-11-22T00:19:39+00:00", "generator": { "date": "2024-11-22T00:19:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0539", "initial_release_date": "2006-07-12T18:13:00+00:00", "revision_history": [ { "date": "2006-07-12T18:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:19:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.ia64", "product": { "name": "vixie-cron-4:4.1-44.EL4.ia64", "product_id": "vixie-cron-4:4.1-44.EL4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=ia64\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=ia64\u0026epoch=4" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.src", "product": { "name": "vixie-cron-4:4.1-44.EL4.src", "product_id": "vixie-cron-4:4.1-44.EL4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.x86_64", "product": { "name": "vixie-cron-4:4.1-44.EL4.x86_64", "product_id": "vixie-cron-4:4.1-44.EL4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.i386", "product": { "name": "vixie-cron-4:4.1-44.EL4.i386", "product_id": "vixie-cron-4:4.1-44.EL4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=i386\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=i386\u0026epoch=4" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.ppc", "product": { "name": "vixie-cron-4:4.1-44.EL4.ppc", "product_id": "vixie-cron-4:4.1-44.EL4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=ppc\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=ppc\u0026epoch=4" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.s390x", "product": { "name": "vixie-cron-4:4.1-44.EL4.s390x", "product_id": "vixie-cron-4:4.1-44.EL4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=s390x\u0026epoch=4" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.s390", "product": { "name": "vixie-cron-4:4.1-44.EL4.s390", "product_id": "vixie-cron-4:4.1-44.EL4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=s390\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=s390\u0026epoch=4" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2607", "discovery_date": "2006-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193146" } ], "notes": [ { "category": "description", "text": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.", "title": "Vulnerability description" }, { "category": "summary", "text": "Jobs start from root when pam_limits enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:vixie-cron-4:4.1-44.EL4.i386", "4AS:vixie-cron-4:4.1-44.EL4.ia64", "4AS:vixie-cron-4:4.1-44.EL4.ppc", "4AS:vixie-cron-4:4.1-44.EL4.s390", "4AS:vixie-cron-4:4.1-44.EL4.s390x", "4AS:vixie-cron-4:4.1-44.EL4.src", "4AS:vixie-cron-4:4.1-44.EL4.x86_64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-4:4.1-44.EL4.src", "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-4:4.1-44.EL4.i386", "4ES:vixie-cron-4:4.1-44.EL4.ia64", "4ES:vixie-cron-4:4.1-44.EL4.ppc", "4ES:vixie-cron-4:4.1-44.EL4.s390", "4ES:vixie-cron-4:4.1-44.EL4.s390x", "4ES:vixie-cron-4:4.1-44.EL4.src", "4ES:vixie-cron-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-4:4.1-44.EL4.i386", "4WS:vixie-cron-4:4.1-44.EL4.ia64", "4WS:vixie-cron-4:4.1-44.EL4.ppc", "4WS:vixie-cron-4:4.1-44.EL4.s390", "4WS:vixie-cron-4:4.1-44.EL4.s390x", "4WS:vixie-cron-4:4.1-44.EL4.src", "4WS:vixie-cron-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2607" }, { "category": "external", "summary": "RHBZ#193146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2607", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2607" } ], "release_date": "2006-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-12T18:13:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:vixie-cron-4:4.1-44.EL4.i386", "4AS:vixie-cron-4:4.1-44.EL4.ia64", "4AS:vixie-cron-4:4.1-44.EL4.ppc", "4AS:vixie-cron-4:4.1-44.EL4.s390", "4AS:vixie-cron-4:4.1-44.EL4.s390x", "4AS:vixie-cron-4:4.1-44.EL4.src", "4AS:vixie-cron-4:4.1-44.EL4.x86_64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-4:4.1-44.EL4.src", "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-4:4.1-44.EL4.i386", "4ES:vixie-cron-4:4.1-44.EL4.ia64", "4ES:vixie-cron-4:4.1-44.EL4.ppc", "4ES:vixie-cron-4:4.1-44.EL4.s390", "4ES:vixie-cron-4:4.1-44.EL4.s390x", "4ES:vixie-cron-4:4.1-44.EL4.src", "4ES:vixie-cron-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-4:4.1-44.EL4.i386", "4WS:vixie-cron-4:4.1-44.EL4.ia64", "4WS:vixie-cron-4:4.1-44.EL4.ppc", "4WS:vixie-cron-4:4.1-44.EL4.s390", "4WS:vixie-cron-4:4.1-44.EL4.s390x", "4WS:vixie-cron-4:4.1-44.EL4.src", "4WS:vixie-cron-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0539" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Jobs start from root when pam_limits enabled" } ] }
rhsa-2006_0539
Vulnerability from csaf_redhat
Published
2006-07-12 18:13
Modified
2024-11-22 00:19
Summary
Red Hat Security Advisory: vixie-cron security update
Notes
Topic
Updated vixie-cron packages that fix a privilege escalation issue are now
available.
This update has been rated as having important security impact by the Red Hat
Security Response Team.
Details
The vixie-cron package contains the Vixie version of cron. Cron is a
standard UNIX daemon that runs specified programs at scheduled times.
A privilege escalation flaw was found in the way Vixie Cron runs programs;
vixie-cron does not properly verify an attempt to set the current process
user id succeeded. It was possible for a malicious local users who
exhausted certain limits to execute arbitrary commands as root via cron.
(CVE-2006-2607)
All users of vixie-cron should upgrade to these updated packages, which
contain a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated vixie-cron packages that fix a privilege escalation issue are now\navailable.\n\nThis update has been rated as having important security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The vixie-cron package contains the Vixie version of cron. Cron is a\nstandard UNIX daemon that runs specified programs at scheduled times.\n\nA privilege escalation flaw was found in the way Vixie Cron runs programs;\nvixie-cron does not properly verify an attempt to set the current process\nuser id succeeded. It was possible for a malicious local users who\nexhausted certain limits to execute arbitrary commands as root via cron.\n(CVE-2006-2607)\n\nAll users of vixie-cron should upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0539", "url": "https://access.redhat.com/errata/RHSA-2006:0539" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "193146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193146" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0539.json" } ], "title": "Red Hat Security Advisory: vixie-cron security update", "tracking": { "current_release_date": "2024-11-22T00:19:39+00:00", "generator": { "date": "2024-11-22T00:19:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0539", "initial_release_date": "2006-07-12T18:13:00+00:00", "revision_history": [ { "date": "2006-07-12T18:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:19:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.ia64", "product": { "name": "vixie-cron-4:4.1-44.EL4.ia64", "product_id": "vixie-cron-4:4.1-44.EL4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=ia64\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=ia64\u0026epoch=4" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.src", "product": { "name": "vixie-cron-4:4.1-44.EL4.src", "product_id": "vixie-cron-4:4.1-44.EL4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.x86_64", "product": { "name": "vixie-cron-4:4.1-44.EL4.x86_64", "product_id": "vixie-cron-4:4.1-44.EL4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.i386", "product": { "name": "vixie-cron-4:4.1-44.EL4.i386", "product_id": "vixie-cron-4:4.1-44.EL4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=i386\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=i386\u0026epoch=4" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.ppc", "product": { "name": "vixie-cron-4:4.1-44.EL4.ppc", "product_id": "vixie-cron-4:4.1-44.EL4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=ppc\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=ppc\u0026epoch=4" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.s390x", "product": { "name": "vixie-cron-4:4.1-44.EL4.s390x", "product_id": "vixie-cron-4:4.1-44.EL4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=s390x\u0026epoch=4" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "vixie-cron-4:4.1-44.EL4.s390", "product": { "name": "vixie-cron-4:4.1-44.EL4.s390", "product_id": "vixie-cron-4:4.1-44.EL4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron@4.1-44.EL4?arch=s390\u0026epoch=4" } } }, { "category": "product_version", "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product_id": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/vixie-cron-debuginfo@4.1-44.EL4?arch=s390\u0026epoch=4" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-4:4.1-44.EL4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.src" }, "product_reference": "vixie-cron-4:4.1-44.EL4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" }, "product_reference": "vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2607", "discovery_date": "2006-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "193146" } ], "notes": [ { "category": "description", "text": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.", "title": "Vulnerability description" }, { "category": "summary", "text": "Jobs start from root when pam_limits enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:vixie-cron-4:4.1-44.EL4.i386", "4AS:vixie-cron-4:4.1-44.EL4.ia64", "4AS:vixie-cron-4:4.1-44.EL4.ppc", "4AS:vixie-cron-4:4.1-44.EL4.s390", "4AS:vixie-cron-4:4.1-44.EL4.s390x", "4AS:vixie-cron-4:4.1-44.EL4.src", "4AS:vixie-cron-4:4.1-44.EL4.x86_64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-4:4.1-44.EL4.src", "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-4:4.1-44.EL4.i386", "4ES:vixie-cron-4:4.1-44.EL4.ia64", "4ES:vixie-cron-4:4.1-44.EL4.ppc", "4ES:vixie-cron-4:4.1-44.EL4.s390", "4ES:vixie-cron-4:4.1-44.EL4.s390x", "4ES:vixie-cron-4:4.1-44.EL4.src", "4ES:vixie-cron-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-4:4.1-44.EL4.i386", "4WS:vixie-cron-4:4.1-44.EL4.ia64", "4WS:vixie-cron-4:4.1-44.EL4.ppc", "4WS:vixie-cron-4:4.1-44.EL4.s390", "4WS:vixie-cron-4:4.1-44.EL4.s390x", "4WS:vixie-cron-4:4.1-44.EL4.src", "4WS:vixie-cron-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2607" }, { "category": "external", "summary": "RHBZ#193146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2607", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2607" } ], "release_date": "2006-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-07-12T18:13:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:vixie-cron-4:4.1-44.EL4.i386", "4AS:vixie-cron-4:4.1-44.EL4.ia64", "4AS:vixie-cron-4:4.1-44.EL4.ppc", "4AS:vixie-cron-4:4.1-44.EL4.s390", "4AS:vixie-cron-4:4.1-44.EL4.s390x", "4AS:vixie-cron-4:4.1-44.EL4.src", "4AS:vixie-cron-4:4.1-44.EL4.x86_64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4AS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-4:4.1-44.EL4.src", "4Desktop:vixie-cron-4:4.1-44.EL4.x86_64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4Desktop:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-4:4.1-44.EL4.i386", "4ES:vixie-cron-4:4.1-44.EL4.ia64", "4ES:vixie-cron-4:4.1-44.EL4.ppc", "4ES:vixie-cron-4:4.1-44.EL4.s390", "4ES:vixie-cron-4:4.1-44.EL4.s390x", "4ES:vixie-cron-4:4.1-44.EL4.src", "4ES:vixie-cron-4:4.1-44.EL4.x86_64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4ES:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-4:4.1-44.EL4.i386", "4WS:vixie-cron-4:4.1-44.EL4.ia64", "4WS:vixie-cron-4:4.1-44.EL4.ppc", "4WS:vixie-cron-4:4.1-44.EL4.s390", "4WS:vixie-cron-4:4.1-44.EL4.s390x", "4WS:vixie-cron-4:4.1-44.EL4.src", "4WS:vixie-cron-4:4.1-44.EL4.x86_64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.i386", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ia64", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.ppc", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.s390x", "4WS:vixie-cron-debuginfo-4:4.1-44.EL4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0539" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Jobs start from root when pam_limits enabled" } ] }
opensuse-su-2024:10139-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
cron-4.2-65.4 on GA media
Notes
Title of the patch
cron-4.2-65.4 on GA media
Description of the patch
These are all security issues fixed in the cron-4.2-65.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10139
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "cron-4.2-65.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the cron-4.2-65.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10139", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10139-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-2607 page", "url": "https://www.suse.com/security/cve/CVE-2006-2607/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0424 page", "url": "https://www.suse.com/security/cve/CVE-2010-0424/" } ], "title": "cron-4.2-65.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10139-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cron-4.2-65.4.aarch64", "product": { "name": "cron-4.2-65.4.aarch64", "product_id": "cron-4.2-65.4.aarch64" } }, { "category": "product_version", "name": "cronie-1.5.0-65.4.aarch64", "product": { "name": "cronie-1.5.0-65.4.aarch64", "product_id": "cronie-1.5.0-65.4.aarch64" } }, { "category": "product_version", "name": "cronie-anacron-1.5.0-65.4.aarch64", "product": { "name": "cronie-anacron-1.5.0-65.4.aarch64", "product_id": "cronie-anacron-1.5.0-65.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cron-4.2-65.4.ppc64le", "product": { "name": "cron-4.2-65.4.ppc64le", "product_id": "cron-4.2-65.4.ppc64le" } }, { "category": "product_version", "name": "cronie-1.5.0-65.4.ppc64le", "product": { "name": "cronie-1.5.0-65.4.ppc64le", "product_id": "cronie-1.5.0-65.4.ppc64le" } }, { "category": "product_version", "name": "cronie-anacron-1.5.0-65.4.ppc64le", "product": { "name": "cronie-anacron-1.5.0-65.4.ppc64le", "product_id": "cronie-anacron-1.5.0-65.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cron-4.2-65.4.s390x", "product": { "name": "cron-4.2-65.4.s390x", "product_id": "cron-4.2-65.4.s390x" } }, { "category": "product_version", "name": "cronie-1.5.0-65.4.s390x", "product": { "name": "cronie-1.5.0-65.4.s390x", "product_id": "cronie-1.5.0-65.4.s390x" } }, { "category": "product_version", "name": "cronie-anacron-1.5.0-65.4.s390x", "product": { "name": "cronie-anacron-1.5.0-65.4.s390x", "product_id": "cronie-anacron-1.5.0-65.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cron-4.2-65.4.x86_64", "product": { "name": "cron-4.2-65.4.x86_64", "product_id": "cron-4.2-65.4.x86_64" } }, { "category": "product_version", "name": "cronie-1.5.0-65.4.x86_64", "product": { "name": "cronie-1.5.0-65.4.x86_64", "product_id": "cronie-1.5.0-65.4.x86_64" } }, { "category": "product_version", "name": "cronie-anacron-1.5.0-65.4.x86_64", "product": { "name": "cronie-anacron-1.5.0-65.4.x86_64", "product_id": "cronie-anacron-1.5.0-65.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cron-4.2-65.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cron-4.2-65.4.aarch64" }, "product_reference": "cron-4.2-65.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cron-4.2-65.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cron-4.2-65.4.ppc64le" }, "product_reference": "cron-4.2-65.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cron-4.2-65.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cron-4.2-65.4.s390x" }, "product_reference": "cron-4.2-65.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cron-4.2-65.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cron-4.2-65.4.x86_64" }, "product_reference": "cron-4.2-65.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-1.5.0-65.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-1.5.0-65.4.aarch64" }, "product_reference": "cronie-1.5.0-65.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-1.5.0-65.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-1.5.0-65.4.ppc64le" }, "product_reference": "cronie-1.5.0-65.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-1.5.0-65.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-1.5.0-65.4.s390x" }, "product_reference": "cronie-1.5.0-65.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-1.5.0-65.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-1.5.0-65.4.x86_64" }, "product_reference": "cronie-1.5.0-65.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-anacron-1.5.0-65.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.aarch64" }, "product_reference": "cronie-anacron-1.5.0-65.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-anacron-1.5.0-65.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.ppc64le" }, "product_reference": "cronie-anacron-1.5.0-65.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-anacron-1.5.0-65.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.s390x" }, "product_reference": "cronie-anacron-1.5.0-65.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cronie-anacron-1.5.0-65.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.x86_64" }, "product_reference": "cronie-anacron-1.5.0-65.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2607", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-2607" } ], "notes": [ { "category": "general", "text": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cron-4.2-65.4.aarch64", "openSUSE Tumbleweed:cron-4.2-65.4.ppc64le", "openSUSE Tumbleweed:cron-4.2-65.4.s390x", "openSUSE Tumbleweed:cron-4.2-65.4.x86_64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-1.5.0-65.4.x86_64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-2607", "url": "https://www.suse.com/security/cve/CVE-2006-2607" }, { "category": "external", "summary": "SUSE Bug 178863 for CVE-2006-2607", "url": "https://bugzilla.suse.com/178863" }, { "category": "external", "summary": "SUSE Bug 537178 for CVE-2006-2607", "url": "https://bugzilla.suse.com/537178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cron-4.2-65.4.aarch64", "openSUSE Tumbleweed:cron-4.2-65.4.ppc64le", "openSUSE Tumbleweed:cron-4.2-65.4.s390x", "openSUSE Tumbleweed:cron-4.2-65.4.x86_64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-1.5.0-65.4.x86_64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-2607" }, { "cve": "CVE-2010-0424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0424" } ], "notes": [ { "category": "general", "text": "The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cron-4.2-65.4.aarch64", "openSUSE Tumbleweed:cron-4.2-65.4.ppc64le", "openSUSE Tumbleweed:cron-4.2-65.4.s390x", "openSUSE Tumbleweed:cron-4.2-65.4.x86_64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-1.5.0-65.4.x86_64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0424", "url": "https://www.suse.com/security/cve/CVE-2010-0424" }, { "category": "external", "summary": "SUSE Bug 579447 for CVE-2010-0424", "url": "https://bugzilla.suse.com/579447" }, { "category": "external", "summary": "SUSE Bug 580800 for CVE-2010-0424", "url": "https://bugzilla.suse.com/580800" }, { "category": "external", "summary": "SUSE Bug 589640 for CVE-2010-0424", "url": "https://bugzilla.suse.com/589640" }, { "category": "external", "summary": "SUSE Bug 590353 for CVE-2010-0424", "url": "https://bugzilla.suse.com/590353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cron-4.2-65.4.aarch64", "openSUSE Tumbleweed:cron-4.2-65.4.ppc64le", "openSUSE Tumbleweed:cron-4.2-65.4.s390x", "openSUSE Tumbleweed:cron-4.2-65.4.x86_64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-1.5.0-65.4.x86_64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.aarch64", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.ppc64le", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.s390x", "openSUSE Tumbleweed:cronie-anacron-1.5.0-65.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-0424" } ] }
gsd-2006-2607
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2006-2607", "description": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.", "id": "GSD-2006-2607", "references": [ "https://www.suse.com/security/cve/CVE-2006-2607.html", "https://access.redhat.com/errata/RHSA-2006:0539" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-2607" ], "details": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.", "id": "GSD-2006-2607", "modified": "2023-12-13T01:19:52.755934Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060525 rPSA-2006-0082-1 vixie-cron", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" }, { "name": "ADV-2006-2075", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2075" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "name": "18108", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18108" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=134194", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "name": "20388", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20388" }, { "name": "1016480", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016480" }, { "name": "USN-778-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/778-1/" }, { "name": "SUSE-SA:2006:027", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "name": "35318", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35318" }, { "name": "21032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21032" }, { "name": "GLSA-200606-07", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "name": "oval:org.mitre.oval:def:10213", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "name": "vixie-cron-docommand-gain-privilege(26691)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "name": "RHSA-2006:0539", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "name": "20616", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20616" }, { "name": "21702", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21702" }, { "name": "20380", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20380" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:paul_vixie:vixie_cron:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2607" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.gentoo.org/show_bug.cgi?id=134194", "refsource": "CONFIRM", "tags": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431", "refsource": "CONFIRM", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "name": "18108", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/18108" }, { "name": "20380", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20380" }, { "name": "SUSE-SA:2006:027", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "name": "20388", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20388" }, { "name": "20616", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20616" }, { "name": "GLSA-200606-07", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "name": "RHSA-2006:0539", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "name": "21032", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21032" }, { "name": "1016480", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1016480" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "name": "21702", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21702" }, { "name": "35318", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35318" }, { "name": "ADV-2006-2075", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/2075" }, { "name": "vixie-cron-docommand-gain-privilege(26691)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "name": "oval:org.mitre.oval:def:10213", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "name": "USN-778-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/778-1/" }, { "name": "20060525 rPSA-2006-0082-1 vixie-cron", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-18T16:40Z", "publishedDate": "2006-05-25T20:02Z" } } }
fkie_cve-2006-2607
Vulnerability from fkie_nvd
Published
2006-05-25 20:02
Modified
2025-04-03 01:03
Severity ?
Summary
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paul_vixie | vixie_cron | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paul_vixie:vixie_cron:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F661927-058A-4F4C-8E0A-DA031A9E85B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf." } ], "id": "CVE-2006-2607", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-05-25T20:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20380" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20388" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20616" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21032" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21702" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35318" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016480" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/18108" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2075" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/778-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/18108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/778-1/" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "lastModified": "2007-03-14T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-m6pc-rv4c-hqmg
Vulnerability from github
Published
2022-05-01 07:00
Modified
2025-04-03 04:33
VLAI Severity ?
Details
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
{ "affected": [], "aliases": [ "CVE-2006-2607" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-05-25T20:02:00Z", "severity": "HIGH" }, "details": "do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.", "id": "GHSA-m6pc-rv4c-hqmg", "modified": "2025-04-03T04:33:15Z", "published": "2022-05-01T07:00:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2607" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178431" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26691" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10213" }, { "type": "WEB", "url": "https://usn.ubuntu.com/778-1" }, { "type": "WEB", "url": "http://bugs.gentoo.org/show_bug.cgi?id=134194" }, { "type": "WEB", "url": "http://secunia.com/advisories/20380" }, { "type": "WEB", "url": "http://secunia.com/advisories/20388" }, { "type": "WEB", "url": "http://secunia.com/advisories/20616" }, { "type": "WEB", "url": "http://secunia.com/advisories/21032" }, { "type": "WEB", "url": "http://secunia.com/advisories/21702" }, { "type": "WEB", "url": "http://secunia.com/advisories/35318" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200606-07.xml" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016480" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-168.htm" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006-05-32.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0539.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/435033/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/18108" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/2075" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…