MGASA-2015-0278

Source
https://advisories.mageia.org/MGASA-2015-0278.html
Import Source
https://advisories.mageia.org/MGASA-2015-0278.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0278
Related
Published
2015-07-24T16:36:06Z
Modified
2015-07-24T16:25:06Z
Summary
Updated libuser package fixes security vulnerabilities
Details

Two flaws were found in the way the libuser library handled the /etc/passwd file. A local attacker could use an application compiled against libuser (for example, userhelper) to manipulate the /etc/passwd file, which could result in a denial of service or possibly allow the attacker to escalate their privileges to root (CVE-2015-3245, CVE-2015-3246).

References
Credits

Affected packages

Mageia:4 / libuser

Package

Name
libuser
Purl
pkg:rpm/mageia/libuser?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.60-2.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / libuser

Package

Name
libuser
Purl
pkg:rpm/mageia/libuser?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.60-5.1.mga5

Ecosystem specific

{
    "section": "core"
}