CVE-2008-5394 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5394): /bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry.
this is already fixed in shadow 4.1.2.2 ... i dont know of any reason to keep it from going stable
base-system, please advice.
Nothing against it going stable either, it's clear from the PAM standpoint.
Arches, please test and mark stable: =sys-apps/shadow-4.1.2.2 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
amd64/x86 stable
ppc64 done
Stable on alpha.
Sparc stable.
Stable for HPPA.
ppc stable
ia64 stable, and the other arches are done
vote: YES
Yes, too. Request filed.
GLSA 200903-24