-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : shadow-utils SUMMARY : Fix for shadow-utils authentication bypass vulnerability DATE : 2004-11-23 11:12:00 ID : CLA-2004:894 RELEVANT RELEASES : 9, 10 - ------------------------------------------------------------------------- DESCRIPTION shadow-utils[1] is a collection of utilities for managing shadow password files and user/group accounts. Martin Schulze reported a vulnerability[2] in the passwd_check() function in "libmisc/pwdcheck.c" which is used by chfn and chsh and thus may allow a local attacker to use them to change the standard shell of other users or modify their GECOS information (full name, phone number...). SOLUTION It is recommended that all Conectiva Linux users upgrade their packages. REFERENCES 1.http://shadow.pld.org.pl/ 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1001 UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/10/SRPMS/shadow-utils-4.0.3-58499U10_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-doc-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-cs-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-de-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-el-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-fr-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-hu-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-id-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-it-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-ja-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-ko-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-pl-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-pt_BR-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-sv-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/shadow-utils-i18n-uk-4.0.3-58499U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/SRPMS/shadow-utils-4.0.3-26706U90_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/shadow-utils-4.0.3-26706U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/shadow-utils-doc-4.0.3-26706U90_1cl.i386.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions regarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2004 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx unsubscribe: conectiva-updates-unsubscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQFBozjj42jd0JmAcZARAtOMAJ4rQIlWqP82s7OzjJ27jp+/N+y8BQCgxN6e R9waNj3xEPPZUAmL/PQy450= =wYFs -----END PGP SIGNATURE-----