-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2164-1 security@debian.org http://www.debian.org/security/ Nico Golde February 16, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : shadow Vulnerability : insufficient input sanitization Problem type : local Debian-specific: no CVE ID : CVE-2011-0721 Kees Cook discovered that the chfn and chsh utilities do not properly sanitize user input that includes newlines. An attacker could use this to to corrupt passwd entries and may create users or groups in NIS environments. Packages in the oldstable distribution (lenny) are not affected by this problem. For the stable distribution (squeeze), this problem has been fixed in version 1:4.1.4.2+svn3283-2+squeeze1. For the testing (wheezy) and unstable (sid) distributions, this problem will be fixed soon. We recommend that you upgrade your shadow packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk1bFBcACgkQHYflSXNkfP8NtwCeJMwW0khoaIyY2S4P5SK8KOKJ CF0AoJ4JqazWLK3RzzGbGgbgppqiVbEF =frUp -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/