lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060313003103.GE25567@piware.de>
Date: Mon Mar 13 00:31:13 2006
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-262-1] Ubuntu 5.10 installer password
	disclosure

===========================================================
Ubuntu Security Notice USN-262-1	     March 12, 2006
Ubuntu 5.10 installer vulnerability
https://launchpad.net/bugs/34606
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

base-config
passwd

The problem can be corrected by upgrading the affected package to
version 2.67ubuntu20 (base-config) and 1:4.0.3-37ubuntu8 (passwd).  In
general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Karl ?ie discovered that the Ubuntu 5.10 installer failed to clean
passwords in the installer log files. Since these files were
world-readable, any local user could see the password of the first
user account, which has full sudo privileges by default.

The updated packages remove the passwords and additionally make the
log files readable only by root.

This does not affect the Ubuntu 4.10, 5.04, or the upcoming 6.04
installer.  However, if you upgraded from Ubuntu 5.10 to the current
development version of Ubuntu 6.04 ('Dapper Drake'), please ensure
that you upgrade the passwd package to version 1:4.0.13-7ubuntu2 to
fix the installer log files.


  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/b/base-config/base-config_2.67ubuntu20.dsc
      Size/MD5:      758 c22bb6e3be4d59aa93e84327f60e89ab
    http://security.ubuntu.com/ubuntu/pool/main/b/base-config/base-config_2.67ubuntu20.tar.gz
      Size/MD5:   577194 99eabbe70227169feaff28ff9062d097
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu8.diff.gz
      Size/MD5:  1067297 9db7bb924125a5587380efc08f6787e1
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu8.dsc
      Size/MD5:      876 50cdfae3bfbe1bb1bb4be192d7de19a7
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz
      Size/MD5:  1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/b/base-config/apt-setup-udeb_2.67ubuntu20_all.udeb
      Size/MD5:     3298 dd42b2901f6f5d7525083c27cbb23407
    http://security.ubuntu.com/ubuntu/pool/main/b/base-config/base-config_2.67ubuntu20_all.deb
      Size/MD5:   291224 e95d7a1d25074ea57d444e817cef1850
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-37ubuntu8_all.udeb
      Size/MD5:     1740 6c7bc8e12968d9876b6e1b27f0476484
    http://security.ubuntu.com/ubuntu/pool/main/b/base-config/tzsetup-udeb_2.67ubuntu20_all.udeb
      Size/MD5:     2760 f6ebc84fd2bff0275b1e64d53fdc9955

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu8_amd64.deb
      Size/MD5:   180662 de75ded6034f0d7226dfbf0ec66e2be7
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu8_amd64.deb
      Size/MD5:   589790 f90c48af4e1c55202f22127e72dbf45d

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu8_i386.deb
      Size/MD5:   171882 347fa929d15c3689bd68fc487cc116c6
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu8_i386.deb
      Size/MD5:   515580 b8c965e4a5c40d1c50e8816aeef689bc

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu8_powerpc.deb
      Size/MD5:   179886 42ebfcd496b621bdab29e9a6b3f50522
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu8_powerpc.deb
      Size/MD5:   568426 089edb3f8110ab191bba6d061b199385
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060313/60f77697/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ