The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 8 LTS:
DLA 1723-1: cron security update
Debian GNU/Linux 9:
DSA 4413-1: ntfs-3g security update
Debian GNU/Linux 8 LTS:
DLA 1723-1: cron security update
Debian GNU/Linux 9:
DSA 4413-1: ntfs-3g security update
DLA 1723-1: cron security update
Package : cron
Version : 3.0pl1-127+deb8u2
CVE ID : CVE-2017-9525 CVE-2019-9704 CVE-2019-9705 CVE-2019-9706
Debian Bug : 809167
Various security problems have been discovered in Debian's CRON scheduler.
CVE-2017-9525
Fix group crontab to root escalation via the Debian package's
postinst script as described by Alexander Peslyak (Solar Designer) in
http://www.openwall.com/lists/oss-security/2017/06/08/3
CVE-2019-9704
DoS: Fix unchecked return of calloc(). Florian Weimer discovered that
a missing check for the return value of calloc() could crash the
daemon, which could be triggered by a very large crontab created by a
user.
CVE-2019-9705
Enforce maximum crontab line count of 1000 to prevent a malicious
user from creating an excessivly large crontab. The daemon will log a
warning for existing files, and crontab(1) will refuse to create new
ones.
CVE-2019-9706
A user reported a use-after-free condition in the cron daemon,
leading to a possible Denial-of-Service scenario by crashing the
daemon.
For Debian 8 "Jessie", these problems have been fixed in version
3.0pl1-127+deb8u2.
We recommend that you upgrade your cron packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 4413-1: ntfs-3g security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4413-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 21, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ntfs-3g
CVE ID : CVE-2019-9755
A heap-based buffer overflow was discovered in NTFS-3G, a read-write
NTFS driver for FUSE. A local user can take advantage of this flaw for
local root privilege escalation.
For the stable distribution (stretch), this problem has been fixed in
version 1:2016.2.22AR.1+dfsg-1+deb9u1.
We recommend that you upgrade your ntfs-3g packages.
For the detailed security status of ntfs-3g please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/ntfs-3g
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/