lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060705222927.GA23928@box79162.elkhouse.de>
Date: Wed Jul  5 23:30:00 2006
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-308-1] shadow vulnerability

=========================================================== 
Ubuntu Security Notice USN-308-1              July 05, 2006
shadow vulnerability
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  passwd                         1:4.0.3-30.7ubuntu16.1

Ubuntu 5.10:
  passwd                         1:4.0.3-37ubuntu10

Ubuntu 6.06 LTS:
  passwd                         1:4.0.13-7ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Ilja van Sprundel discovered that passwd, when called with the -f, -g,
or -s option, did not check the result of the setuid() call. On
systems that configure PAM limits for the maximum number of user
processes, a local attacker could exploit this to execute chfn,
gpasswd, or chsh with root privileges.

This does not affect the default configuration of Ubuntu.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-30.7ubuntu16.1.diff.gz
      Size/MD5:  1161448 adba4705f1491691a39f471ffc92c09b
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-30.7ubuntu16.1.dsc
      Size/MD5:      786 f3f8c3843a16523e8b09bc73c664646e
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz
      Size/MD5:  1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-30.7ubuntu16.1_all.udeb
      Size/MD5:    67204 433e3ad008f269d3879b4b36e863b6b0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_amd64.deb
      Size/MD5:   172388 1ae1307fe20ec93ee5cda9674bff7d31
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_amd64.deb
      Size/MD5:   591158 07c3c7e5326d116619376f750191881c

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_i386.deb
      Size/MD5:   162780 d65e55fb3fd9a6d8c58a8f0117a0b63d
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_i386.deb
      Size/MD5:   513386 93d96b05b65825f12aa0c43c9a4c07ee

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-30.7ubuntu16.1_powerpc.deb
      Size/MD5:   171348 0f3c8f157ac3b1717334521587cede0d
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-30.7ubuntu16.1_powerpc.deb
      Size/MD5:   558434 91148b7d12fc0a405ecc6009fddb8915

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu10.diff.gz
      Size/MD5:  1070307 8b2fb08f4314b8a5d7d0228e516d254e
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu10.dsc
      Size/MD5:      877 dcd588a15b6a706215191df0b1aa91d7
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz
      Size/MD5:  1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-37ubuntu10_all.udeb
      Size/MD5:     1828 82abf8eb28a61b8fbe00c0c85b85099a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_amd64.deb
      Size/MD5:   180932 2cdc5bc553c305ad71601eab30d91ecc
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_amd64.deb
      Size/MD5:   590358 afa8b5c3552db22b12ce6ed3ac16dc7e

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_i386.deb
      Size/MD5:   172160 573cb37f61f18087fc2e42ee1e0a8c3a
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_i386.deb
      Size/MD5:   515976 0fb3906bfd5a1c9992a34119460161d6

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_powerpc.deb
      Size/MD5:   180218 d71a7d3615c0433e9c9c360316d45619
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_powerpc.deb
      Size/MD5:   568772 e3599c6460d3fa76c141948e0dd0647f

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu10_sparc.deb
      Size/MD5:   173624 ed7f31e26778d7b90825a8047dd132e9
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu10_sparc.deb
      Size/MD5:   525696 1184279ca53d144f86b89d5c4a236492

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.1.diff.gz
      Size/MD5:   201154 5439f48ff6e7a91d78da688d9eaec0e9
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.1.dsc
      Size/MD5:      887 210a8df854ade3afc11536ed918e9030
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13.orig.tar.gz
      Size/MD5:  1622557 034fab52e187e63cb52f153bb7f304c8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.1_amd64.deb
      Size/MD5:   249324 3041a38bb86df7ffb40b73952e498684
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.1_amd64.deb
      Size/MD5:   683116 41b202a0066df6fe7b0e76e0ae660a5c

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.1_i386.deb
      Size/MD5:   240808 fc035322e94f8f1a6ffef669b4358ec7
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.1_i386.deb
      Size/MD5:   615996 b36322bc8a65657af67057b5bb86cb0d

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.1_powerpc.deb
      Size/MD5:   251236 29d6b23dffd5b4431aac241012dd6158
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.1_powerpc.deb
      Size/MD5:   664842 5563779a731a87712744f8107c015d9b

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.1_sparc.deb
      Size/MD5:   239766 e3f275f96e8425f70460dcf9db1f00c2
    http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.1_sparc.deb
      Size/MD5:   619800 92f7fe2c32a62fa4517b7cc89c497dfc

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060706/06945dac/attachment-0001.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ