LWN.net Logo

Mageia alert MGASA-2013-0071 (nss-pam-ldapd)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0071: nss-pam-ldapd-0.8.6-3.1.mga2 (2/core)
Date:  Wed, 27 Feb 2013 22:02:35 +0100
Message-ID:  <20130227210235.GA15226@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0071 Date: February 27nd, 2013 Affected releases: 2 Media: Core Description: Updated nss-pam-ldapd packages fixes the following security vulnerability: Garth Mollett discovered that a file descriptor overflow issue in the use of FD_SET() in nss-pam-ldapd can lead to a stack-based buffer overflow. An attacker could, under some circumstances, use this flaw to cause a process that has the NSS or PAM module loaded to crash or potentially execute arbitrary code. The issue can be triggered in a network daemon by opening a large number of connections and forcing a name lookup. This would result in a crash and possibly remote code execution. This issue may also allow local privilege escalation if a suid program does name lookups and doesn't close file descriptors inherited from the parent process (CVE-2013-0288). Updated Packages: i586: nss-pam-ldapd-0.8.6-3.1.mga2.i586.rpm nss-pam-ldapd-debug-0.8.6-3.1.mga2.i586.rpm x86_64: nss-pam-ldapd-0.8.6-3.1.mga2.x86_64.rpm nss-pam-ldapd-debug-0.8.6-3.1.mga2.x86_64.rpm SRPMS: nss-pam-ldapd-0.8.6-3.1.mga2.src.rpm References: http://arthurdejong.org/nss-pam-ldapd/CVE-2013-0288 https://bugs.mageia.org/show_bug.cgi?id=9113 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds