{"id":"MGASA-2015-0352","summary":"Updated util-linux packages fix CVE-2015-5224","details":"Updated util-linux packages fix security vulnerability:\n\nThe chfn and chsh commands in util-linux's login-utils are vulnerable to a\nfile name collision due to incorrect mkstemp usage. If the chfn and chsh\nbinaries are both setuid-root they eventually call mkostemp in such a way that\nan attacker could repeatedly call them and eventually be able to overwrite\ncertain files in /etc (CVE-2015-5224).\n","modified":"2026-04-16T06:22:32.662496528Z","published":"2015-09-08T17:55:59Z","upstream":["CVE-2015-5224"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0352.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16641"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2015/08/24/3"}],"affected":[{"package":{"name":"util-linux","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/util-linux?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.25.2-3.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0352.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}