From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-200606-02.xml | 69 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 glsa-200606-02.xml (limited to 'glsa-200606-02.xml') diff --git a/glsa-200606-02.xml b/glsa-200606-02.xml new file mode 100644 index 000000000000..1543add13c14 --- /dev/null +++ b/glsa-200606-02.xml @@ -0,0 +1,69 @@ + + + + + + + shadow: Privilege escalation + + A security issue in shadow allows a local user to perform certain actions + with escalated privileges. + + shadow + June 07, 2006 + June 07, 2006: 01 + 133615 + local + + + 4.0.15-r2 + 4.0.15-r2 + + + +

+ shadow provides a set of utilities to deal with user accounts. +

+
+ +

+ When the mailbox is created in useradd, the "open()" function does + not receive the three arguments it expects while O_CREAT is present, + which leads to random permissions on the created file, before fchmod() + is executed. +

+
+ +

+ Depending on the random permissions given to the mailbox file + which is at this time owned by root, a local user may be able to open + this file for reading or writing, or even executing it, maybe as the + root user. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All shadow users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.0.15-r2" +
+ + CVE-2006-1174 + + + falco + + + falco + + + falco + +
-- cgit v1.2.3-65-gdbad