MGASA-2017-0024

Source
https://advisories.mageia.org/MGASA-2017-0024.html
Import Source
https://advisories.mageia.org/MGASA-2017-0024.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0024
Related
Published
2017-01-27T20:30:52Z
Modified
2017-01-27T20:19:37Z
Summary
Updated shadow-utils packages fix security vulnerabilities
Details

It was found that shadow-utils-4.2.1 had a potentially unsafe use of getlogin with the concern that the utmp entry might have a spoofed username associated with a correct uid (CVE-2016-6251).

It was found that shadow-utils-4.2.1 had an incorrect integer handling problem where it looks like the int wrap is exploitable as a LPE, as the kernel is using 32bit uid's that are truncated from unsigned longs (64bit on x64) as returned by simplestrtoul() [mapwrite()]. (CVE-2016-6252).

References
Credits

Affected packages

Mageia:5 / shadow-utils

Package

Name
shadow-utils
Purl
pkg:rpm/mageia/shadow-utils?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.1-6.mga5

Ecosystem specific

{
    "section": "core"
}