[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1LeGB7-00051x-Ha@titan.mandriva.com>
Date: Mon, 02 Mar 2009 23:00:01 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:062 ] shadow-utils
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:062
http://www.mandriva.com/security/
_______________________________________________________________________
Package : shadow-utils
Date : March 2, 2009
Affected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
A security vulnerability has been identified and fixed in login
application from shadow-utils, which could allow local users in
the utmp group to overwrite arbitrary files via a symlink attack on
a temporary file referenced in a line (aka ut_line) field in a utmp
entry (CVE-2008-5394).
The updated packages have been patched to prevent this.
Note: Mandriva Linux is using login application from util-linux-ng
by default, and therefore is not affected by this issue on default
configuration.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5394
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.0:
e82e43f364f91d855f3cd4ff8c7cce1c 2008.0/i586/shadow-utils-4.0.12-8.1mdv2008.0.i586.rpm
5df52461fd4554127eb8124fee26f643 2008.0/SRPMS/shadow-utils-4.0.12-8.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
f4ec93fe8c573d6a987307eb4f9584c1 2008.0/x86_64/shadow-utils-4.0.12-8.1mdv2008.0.x86_64.rpm
5df52461fd4554127eb8124fee26f643 2008.0/SRPMS/shadow-utils-4.0.12-8.1mdv2008.0.src.rpm
Mandriva Linux 2008.1:
2efe1e314945bb00df69f8e51bf69b07 2008.1/i586/shadow-utils-4.0.12-9.1mdv2008.1.i586.rpm
79175572afdf677c2baec382aa1fccd9 2008.1/SRPMS/shadow-utils-4.0.12-9.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
4268a6e88794f7170a9576ac285aa13e 2008.1/x86_64/shadow-utils-4.0.12-9.1mdv2008.1.x86_64.rpm
79175572afdf677c2baec382aa1fccd9 2008.1/SRPMS/shadow-utils-4.0.12-9.1mdv2008.1.src.rpm
Mandriva Linux 2009.0:
25cc294b080fe1fefef1abdfe02b0c55 2009.0/i586/shadow-utils-4.0.12-17.1mdv2009.0.i586.rpm
d6e3c01f6acf6924bb3d014d3eca47eb 2009.0/SRPMS/shadow-utils-4.0.12-17.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
b53608b463bcbf53e6a1b44e5aa94038 2009.0/x86_64/shadow-utils-4.0.12-17.1mdv2009.0.x86_64.rpm
d6e3c01f6acf6924bb3d014d3eca47eb 2009.0/SRPMS/shadow-utils-4.0.12-17.1mdv2009.0.src.rpm
Corporate 3.0:
eecf8b2ca9adcd2b07540d89aff4ce88 corporate/3.0/i586/shadow-utils-4.0.3-8.3.C30mdk.i586.rpm
9b6a92a2a85285c6213adc8805f8c1dc corporate/3.0/SRPMS/shadow-utils-4.0.3-8.3.C30mdk.src.rpm
Corporate 3.0/X86_64:
c7e18849cf9c76fa2e514ff52f2e3acd corporate/3.0/x86_64/shadow-utils-4.0.3-8.3.C30mdk.x86_64.rpm
9b6a92a2a85285c6213adc8805f8c1dc corporate/3.0/SRPMS/shadow-utils-4.0.3-8.3.C30mdk.src.rpm
Corporate 4.0:
897e0e969a6947930aaae5429e0af21d corporate/4.0/i586/shadow-utils-4.0.12-2.1.20060mlcs4.i586.rpm
7da4221820c4450587adcdce390b2a74 corporate/4.0/SRPMS/shadow-utils-4.0.12-2.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
a5b683a62a9b173016eb2d974451ca34 corporate/4.0/x86_64/shadow-utils-4.0.12-2.1.20060mlcs4.x86_64.rpm
7da4221820c4450587adcdce390b2a74 corporate/4.0/SRPMS/shadow-utils-4.0.12-2.1.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
ad2facc0ef1efdb42e5d8e7d461ae902 mnf/2.0/i586/shadow-utils-4.0.3-8.3.C30mdk.i586.rpm
b2c0b4d3a30d53fbd1fc933eac4bf79b mnf/2.0/SRPMS/shadow-utils-4.0.3-8.3.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFJrCl3mqjQ0CJFipgRAndrAKCMfFwTXt0nNh2JpNcbnsJWoNyZ/QCePMmx
q/caPwQXSF5s9m0PGHeBpzM=
=GLpj
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists