Full Disclosure mailing list archives
[SECURITY] [DSA 2164-1] shadow security update
From: Nico Golde <nion () debian org>
Date: Wed, 16 Feb 2011 01:02:31 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2164-1 security () debian org http://www.debian.org/security/ Nico Golde February 16, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : shadow Vulnerability : insufficient input sanitization Problem type : local Debian-specific: no CVE ID : CVE-2011-0721 Kees Cook discovered that the chfn and chsh utilities do not properly sanitize user input that includes newlines. An attacker could use this to to corrupt passwd entries and may create users or groups in NIS environments. Packages in the oldstable distribution (lenny) are not affected by this problem. For the stable distribution (squeeze), this problem has been fixed in version 1:4.1.4.2+svn3283-2+squeeze1. For the testing (wheezy) and unstable (sid) distributions, this problem will be fixed soon. We recommend that you upgrade your shadow packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce () lists debian org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk1bFBcACgkQHYflSXNkfP8NtwCeJMwW0khoaIyY2S4P5SK8KOKJ CF0AoJ4JqazWLK3RzzGbGgbgppqiVbEF =frUp -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [SECURITY] [DSA 2164-1] shadow security update Nico Golde (Feb 16)