Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 9 Jan 2013 08:46:44 -0700
From: Vincent Danen <>
Subject: Re: CVE Request: cronie fd leak

* [2013-01-09 09:24:23 +0100] Sebastian Krahmer wrote:

>Possible that you have got a different cron implementation.

No, we're using cronie as well.

>There is no hidden info in our bugzilla; the reproducer
>is using lvm commands, but I remember it worked with any
>command. Actually its not about the warnings, a "cat" will probably
>also do, if you check its /proc/$pid/fd when its invoked.
>But cat doesnt emit warnings about open fd's.
>Not sure about upstream, probably not.

Ok, so did some more digging based on some info from one of our
developers that we had patched this in Fedora.

Looks like this patch introduced the leak on 2011-04-28:

And this patch reverted it on 2011-06-29:

So it looks like only 1.4.8 was affected by this (which, judging by the
patch in your bugzilla is the same version you're seeing as affected).

That might be a better patch to use than what you're using.  Anyways,
this only affects 1.4.8 (for any others using cronie and concerned as to
whether or not they might be affected).

This was also reported to our bugzilla here:

>On Tue, Jan 08, 2013 at 09:01:19PM -0700, Vincent Danen wrote:
>> * [2013-01-08 13:56:40 +0100] Sebastian Krahmer wrote:
>>> "Hello Kurt, Steve, vendors,"
>>> cronie leaks read-only fd's, please check here:
>>> can someone assign a CVE?
>> Sebastian, do you have a specific command that you're using?  I'm trying
>> to reproduce this in Fedora and RHEL using lvdisplay (maybe a bad
>> choice?) and also using "lvm vgck -v vg_thor && lvm pvs" in
>> /etc/crontab.
>> The output is mailed to me fine with no warnings?  Can you share what
>> command was being used to reproduce this?  It's possible that something
>> you added (or we added) makes this a non-issue on other platforms.
>> Has upstream been informed of this yet?
>> --
>> Vincent Danen / Red Hat Security Response Team
>~ perl
>~ $_='print"\$_=\47$_\47;eval"';eval
>~ - SuSE Security Team

Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.