Advisory Published
CVE Published
Updated

CVE-2015-5224

First published: Tue Aug 25 2015(Updated: )

The following vulnerability in util-linux was announced (taken from <a href="http://seclists.org/oss-sec/2015/q3/423">http://seclists.org/oss-sec/2015/q3/423</a>): """ If the chfn and chsh binaries (both setuid-root) from util-linux/login-utils are compiled WITHOUT libuser support, they eventually call mkostemp(localtmp, O_RDWR|O_CREAT|O_EXCL|O_CLOEXEC); where localtmp is "/etc/%s.XXXXXX" and %s is __progname (i.e., argv[0]'s basename). An attacker could repeatedly execve chfn as "ld.so" until mkostemp() creates "/etc/ld.so.preload" (after a few days, in our tests). This particular example doesn't actually work, because "preload" is 7 chars and "XXXXXX" is 6 chars, but it seems there are other interesting possibilities, like "/etc/rc.status" and "/etc/krb5.keytab". The impact of this vulnerability is probably very limited: most Linux distributions ship either the chfn/chsh binaries from the shadow-utils (NOT the login-utils ones), or the login-utils ones but WITH libuser support. """ Upstream patch: <a href="https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9">https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9</a>

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
util-linux<=2.26.2
util-linux=2.27-rc1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2015-5224?

    CVE-2015-5224 has a medium severity rating due to its potential for privilege escalation.

  • How do I fix CVE-2015-5224?

    To fix CVE-2015-5224, upgrade util-linux to version 2.27 or later or ensure it is compiled with libuser support.

  • What are the affected versions of util-linux in CVE-2015-5224?

    The affected versions include util-linux versions prior to 2.27 and 2.26.2 or lower.

  • What is the nature of the vulnerability in CVE-2015-5224?

    CVE-2015-5224 is a privilege escalation vulnerability in the setuid-root binaries chfn and chsh when compiled without libuser support.

  • Can applications using util-linux be affected by CVE-2015-5224?

    Yes, applications that rely on the vulnerable util-linux components can be exploited if they are compiled without appropriate protections.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203