USN-5259-2

Source
https://ubuntu.com/security/notices/USN-5259-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5259-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-5259-2
Related
Published
2022-05-06T08:42:24.468406Z
Modified
2022-05-06T08:42:24.468406Z
Summary
cron vulnerabilities
Details

USN-5259-1 fixed several vulnerabilities in Cron. This update provides the corresponding update for Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that the postinst maintainer script in Cron unsafely handled file permissions during package install or update operations. An attacker could possibly use this issue to perform a privilege escalation attack. (CVE-2017-9525)

Florian Weimer discovered that Cron incorrectly handled certain memory operations during crontab file creation. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-9704)

It was discovered that Cron incorrectly handled user input during crontab file creation. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-9705)

It was discovered that Cron contained a use-after-free vulnerability in its forcerescanuser function. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-9706)

References

Affected packages

Ubuntu:18.04:LTS / cron

Package

Name
cron
Purl
pkg:deb/ubuntu/cron@3.0pl1-128.1ubuntu1.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0pl1-128.1ubuntu1.1

Affected versions

3.*

3.0pl1-128ubuntu5
3.0pl1-128.1ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.0pl1-128.1ubuntu1.1",
            "binary_name": "cron"
        },
        {
            "binary_version": "3.0pl1-128.1ubuntu1.1",
            "binary_name": "cron-dbgsym"
        }
    ]
}