what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-062

Mandriva Linux Security Advisory 2009-062
Posted Mar 3, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-062 - A security vulnerability has been identified and fixed in login application from shadow-utils, which could allow local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry. The updated packages have been patched to prevent this. Note: Mandriva Linux is using login application from util-linux-ng by default, and therefore is not affected by this issue on default configuration.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2008-5394
SHA-256 | f85164ad0dd2f9a35f8b48660973cda52086237a9ab2d346109d2032752d2d29

Mandriva Linux Security Advisory 2009-062

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:062
http://www.mandriva.com/security/
_______________________________________________________________________

Package : shadow-utils
Date : March 2, 2009
Affected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

A security vulnerability has been identified and fixed in login
application from shadow-utils, which could allow local users in
the utmp group to overwrite arbitrary files via a symlink attack on
a temporary file referenced in a line (aka ut_line) field in a utmp
entry (CVE-2008-5394).

The updated packages have been patched to prevent this.

Note: Mandriva Linux is using login application from util-linux-ng
by default, and therefore is not affected by this issue on default
configuration.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5394
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
e82e43f364f91d855f3cd4ff8c7cce1c 2008.0/i586/shadow-utils-4.0.12-8.1mdv2008.0.i586.rpm
5df52461fd4554127eb8124fee26f643 2008.0/SRPMS/shadow-utils-4.0.12-8.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
f4ec93fe8c573d6a987307eb4f9584c1 2008.0/x86_64/shadow-utils-4.0.12-8.1mdv2008.0.x86_64.rpm
5df52461fd4554127eb8124fee26f643 2008.0/SRPMS/shadow-utils-4.0.12-8.1mdv2008.0.src.rpm

Mandriva Linux 2008.1:
2efe1e314945bb00df69f8e51bf69b07 2008.1/i586/shadow-utils-4.0.12-9.1mdv2008.1.i586.rpm
79175572afdf677c2baec382aa1fccd9 2008.1/SRPMS/shadow-utils-4.0.12-9.1mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
4268a6e88794f7170a9576ac285aa13e 2008.1/x86_64/shadow-utils-4.0.12-9.1mdv2008.1.x86_64.rpm
79175572afdf677c2baec382aa1fccd9 2008.1/SRPMS/shadow-utils-4.0.12-9.1mdv2008.1.src.rpm

Mandriva Linux 2009.0:
25cc294b080fe1fefef1abdfe02b0c55 2009.0/i586/shadow-utils-4.0.12-17.1mdv2009.0.i586.rpm
d6e3c01f6acf6924bb3d014d3eca47eb 2009.0/SRPMS/shadow-utils-4.0.12-17.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
b53608b463bcbf53e6a1b44e5aa94038 2009.0/x86_64/shadow-utils-4.0.12-17.1mdv2009.0.x86_64.rpm
d6e3c01f6acf6924bb3d014d3eca47eb 2009.0/SRPMS/shadow-utils-4.0.12-17.1mdv2009.0.src.rpm

Corporate 3.0:
eecf8b2ca9adcd2b07540d89aff4ce88 corporate/3.0/i586/shadow-utils-4.0.3-8.3.C30mdk.i586.rpm
9b6a92a2a85285c6213adc8805f8c1dc corporate/3.0/SRPMS/shadow-utils-4.0.3-8.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
c7e18849cf9c76fa2e514ff52f2e3acd corporate/3.0/x86_64/shadow-utils-4.0.3-8.3.C30mdk.x86_64.rpm
9b6a92a2a85285c6213adc8805f8c1dc corporate/3.0/SRPMS/shadow-utils-4.0.3-8.3.C30mdk.src.rpm

Corporate 4.0:
897e0e969a6947930aaae5429e0af21d corporate/4.0/i586/shadow-utils-4.0.12-2.1.20060mlcs4.i586.rpm
7da4221820c4450587adcdce390b2a74 corporate/4.0/SRPMS/shadow-utils-4.0.12-2.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
a5b683a62a9b173016eb2d974451ca34 corporate/4.0/x86_64/shadow-utils-4.0.12-2.1.20060mlcs4.x86_64.rpm
7da4221820c4450587adcdce390b2a74 corporate/4.0/SRPMS/shadow-utils-4.0.12-2.1.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
ad2facc0ef1efdb42e5d8e7d461ae902 mnf/2.0/i586/shadow-utils-4.0.3-8.3.C30mdk.i586.rpm
b2c0b4d3a30d53fbd1fc933eac4bf79b mnf/2.0/SRPMS/shadow-utils-4.0.3-8.3.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJrCl3mqjQ0CJFipgRAndrAKCMfFwTXt0nNh2JpNcbnsJWoNyZ/QCePMmx
q/caPwQXSF5s9m0PGHeBpzM=
=GLpj
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close