Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 3793-1] shadow security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 3793-1] shadow security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 3793-1] shadow security update
  • Date: Fri, 24 Feb 2017 19:00:46 +0000
  • List-archive: https://lists.debian.org/msgid-search/E1chL6k-0001DC-1X AT master.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Fri, 24 Feb 2017 19:01:04 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <klGWZDo0OdC.A.1MB.vLIsYB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3793-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 24, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : shadow
CVE ID : CVE-2016-6252 CVE-2017-2616
Debian Bug : 832170 855943

Several vulnerabilities were discovered in the shadow suite. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2016-6252

An integer overflow vulnerability was discovered, potentially
allowing a local user to escalate privileges via crafted input to
the newuidmap utility.

CVE-2017-2616

Tobias Stoeckmann discovered that su does not properly handle
clearing a child PID. A local attacker can take advantage of this
flaw to send SIGKILL to other processes with root privileges,
resulting in denial of service.

For the stable distribution (jessie), these problems have been fixed in
version 1:4.2-3+deb8u3.

We recommend that you upgrade your shadow packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAliwgfhfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0T/wBAAkw+QyYpJCh3zvZHiIzkf5txegpnOtZsZ4kKM+vF3mK+jyLNfP87s+VYn
nyjXvEp2LAWhQ3YiAvbRKseHbaMahy7V0HqzDQZIJrIDYZzk2KjAu7GBrE47bzVp
000VQTJWDKuZZx82YSJjYlP10l2maKIYfG5UcPCnOFCvX3A5HLhF9uqM0xqthClm
RIvvSgyfSdSeGtmTzkcejIMH6himjSjPkkRvvIn9DVH0+ngT50XHc+svbjpmTfM+
QQpr/EUIPN6wVaonsqgaq2O43XrfwJhDXO4IeebUWpyo1pL7VijZw6nqwiOOF4Ed
CH227fvCeNlPuxuanxU/L6X60vTVDwnE1shY275c4p6HtK+/hD/rOxgnMO0KKDN3
inc49wQNUoN31Z+kzfufT+Gcn0V/FMIhnXuCofggZk3VyaxUCCj5wGo6FWKBOPwg
D4blQ2At5965qdFAODnRQExhDJjKdSC/i3LwLeRz3ph1YMlIdR93SvxtSUEyCoKR
yiuv4RYdMIgQvPlKOB03RNzE+PnrGRPGY9hWXxi+DKBTV5gnyD5bsPJ5Wz2R9wRP
eFZV6Z+1HXLql6uR9iGxNk3ZNhOcvqiRQ03+8L++hJ5FoKEpsAQQ7FkXzsukEEK2
dkMF1MRUbhPoMp1PRtKEFQsorPWKtlFrlxwelOwWdVPWGthgi18=
=uwtS
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 3793-1] shadow security update, Salvatore Bonaccorso, 24.02.2017

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang