[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3793-1] shadow security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3793-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 24, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : shadow
CVE ID         : CVE-2016-6252 CVE-2017-2616
Debian Bug     : 832170 855943

Several vulnerabilities were discovered in the shadow suite. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2016-6252

    An integer overflow vulnerability was discovered, potentially
    allowing a local user to escalate privileges via crafted input to
    the newuidmap utility.

CVE-2017-2616

    Tobias Stoeckmann discovered that su does not properly handle
    clearing a child PID. A local attacker can take advantage of this
    flaw to send SIGKILL to other processes with root privileges,
    resulting in denial of service.

For the stable distribution (jessie), these problems have been fixed in
version 1:4.2-3+deb8u3.

We recommend that you upgrade your shadow packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=uwtS
-----END PGP SIGNATURE-----


Reply to: