UBUNTU-CVE-2017-1000082

Source
https://ubuntu.com/security/CVE-2017-1000082
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-1000082.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-1000082
Upstream
Published
2017-07-07T17:29:00Z
Modified
2025-07-16T08:12:43.984728Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

References

Affected packages

Ubuntu:Pro:16.04:LTS / systemd

Package

Name
systemd
Purl
pkg:deb/ubuntu/systemd@229-4ubuntu21.31+esm3?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other

225-1ubuntu9
227-2ubuntu1
227-2ubuntu2
228-1ubuntu2
228-2ubuntu1
228-2ubuntu2
228-3ubuntu1
228-4ubuntu1
228-4ubuntu2
228-5ubuntu1
228-5ubuntu2
228-5ubuntu3
228-6ubuntu1
229-1ubuntu2
229-1ubuntu4
229-2ubuntu1
229-3ubuntu1
229-3ubuntu2
229-4ubuntu1
229-4ubuntu4
229-4ubuntu5
229-4ubuntu6
229-4ubuntu7
229-4ubuntu8
229-4ubuntu10
229-4ubuntu11
229-4ubuntu12
229-4ubuntu13
229-4ubuntu16
229-4ubuntu17
229-4ubuntu19
229-4ubuntu20
229-4ubuntu21

229-4ubuntu21.*

229-4ubuntu21.1
229-4ubuntu21.2
229-4ubuntu21.3
229-4ubuntu21.4
229-4ubuntu21.5
229-4ubuntu21.6
229-4ubuntu21.8
229-4ubuntu21.9
229-4ubuntu21.10
229-4ubuntu21.15
229-4ubuntu21.16
229-4ubuntu21.17
229-4ubuntu21.19
229-4ubuntu21.21
229-4ubuntu21.22
229-4ubuntu21.23
229-4ubuntu21.27
229-4ubuntu21.28
229-4ubuntu21.29
229-4ubuntu21.31
229-4ubuntu21.31+esm1
229-4ubuntu21.31+esm3