USN-3276-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3276-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3276-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3276-1
Related
Published
2017-05-05T07:12:28.134204Z
Modified
2017-05-05T07:12:28.134204Z
Summary
shadow vulnerabilities
Details

Sebastian Krahmer discovered integer overflows in shadow utilities. A local attacker could possibly cause them to crash or potentially gain privileges via crafted input. (CVE-2016-6252)

Tobias Stöckmann discovered a race condition in su. A local attacker could cause su to send SIGKILL to other processes with root privileges. (CVE-2017-2616)

References

Affected packages

Ubuntu:14.04:LTS / shadow

Package

Name
shadow
Purl
pkg:deb/ubuntu/shadow@1:4.1.5.1-1ubuntu9.4?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.5.1-1ubuntu9.4

Affected versions

1:4.*

1:4.1.5.1-1ubuntu6
1:4.1.5.1-1ubuntu7
1:4.1.5.1-1ubuntu8
1:4.1.5.1-1ubuntu9
1:4.1.5.1-1ubuntu9.1
1:4.1.5.1-1ubuntu9.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "login": "1:4.1.5.1-1ubuntu9.4",
            "passwd-dbgsym": "1:4.1.5.1-1ubuntu9.4",
            "uidmap": "1:4.1.5.1-1ubuntu9.4",
            "passwd": "1:4.1.5.1-1ubuntu9.4",
            "uidmap-dbgsym": "1:4.1.5.1-1ubuntu9.4",
            "login-dbgsym": "1:4.1.5.1-1ubuntu9.4"
        }
    ]
}

Ubuntu:16.04:LTS / shadow

Package

Name
shadow
Purl
pkg:deb/ubuntu/shadow@1:4.2-3.1ubuntu5.2?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2-3.1ubuntu5.2

Affected versions

1:4.*

1:4.1.5.1-1.1ubuntu7
1:4.2-3.1ubuntu1
1:4.2-3.1ubuntu2
1:4.2-3.1ubuntu3
1:4.2-3.1ubuntu4
1:4.2-3.1ubuntu5

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "login": "1:4.2-3.1ubuntu5.2",
            "passwd-dbgsym": "1:4.2-3.1ubuntu5.2",
            "uidmap": "1:4.2-3.1ubuntu5.2",
            "passwd": "1:4.2-3.1ubuntu5.2",
            "uidmap-dbgsym": "1:4.2-3.1ubuntu5.2",
            "login-dbgsym": "1:4.2-3.1ubuntu5.2"
        }
    ]
}