First published: Thu Jul 06 2006(Updated: )
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Ubuntu Linux | =5.10 | |
Ubuntu Ubuntu Linux | =6.06_lts | |
Ubuntu Ubuntu Linux | =5.04 | |
Ubuntu Ubuntu Linux | =5.10 | |
Ubuntu Ubuntu Linux | =5.04 | |
Ubuntu Ubuntu Linux | =5.10 | |
Ubuntu Ubuntu Linux | =5.10 | |
Ubuntu Ubuntu Linux | =6.06_lts | |
Ubuntu Ubuntu Linux | =6.06_lts | |
Ubuntu Ubuntu Linux | =6.06_lts | |
Ubuntu Ubuntu Linux | =5.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.