Mageia alert MGASA-2017-0024 (shadow-utils)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2017-0024: Updated shadow-utils packages fix security vulnerabilities | |
Date: | Fri, 27 Jan 2017 21:31:22 +0100 | |
Message-ID: | <20170127203122.2B8279F7E7@duvel.mageia.org> |
MGASA-2017-0024 - Updated shadow-utils packages fix security vulnerabilities Publication date: 27 Jan 2017 URL: http://advisories.mageia.org/MGASA-2017-0024.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-6251, CVE-2016-6252 Description: It was found that shadow-utils-4.2.1 had a potentially unsafe use of getlogin with the concern that the utmp entry might have a spoofed username associated with a correct uid (CVE-2016-6251). It was found that shadow-utils-4.2.1 had an incorrect integer handling problem where it looks like the int wrap is exploitable as a LPE, as the kernel is using 32bit uid's that are truncated from unsigned longs (64bit on x64) as returned by simple_strtoul() [map_write()]. (CVE-2016-6252). References: - https://bugs.mageia.org/show_bug.cgi?id=18984 - http://openwall.com/lists/oss-security/2016/07/20/2 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6251 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252 SRPMS: - 5/core/shadow-utils-4.2.1-6.mga5