USN-3276-2

Source
https://ubuntu.com/security/notices/USN-3276-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3276-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3276-2
Published
2017-05-17T01:55:06Z
Modified
2026-02-10T04:41:07Z
Summary
shadow regression
Details

USN-3276-1 intended to fix a vulnerability in su. The solution introduced a regression in su signal handling. This update modifies the security fix. We apologize for the inconvenience.

Original advisory details:

Sebastian Krahmer discovered integer overflows in shadow utilities. A local attacker could possibly cause them to crash or potentially gain privileges via crafted input. (CVE-2016-6252)

Tobias Stöckmann discovered a race condition in su. A local attacker could cause su to send SIGKILL to other processes with root privileges. (CVE-2017-2616)

References

Affected packages

Ubuntu:14.04:LTS / shadow

Package

Name
shadow
Purl
pkg:deb/ubuntu/shadow@1:4.1.5.1-1ubuntu9.5?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.5.1-1ubuntu9.5

Affected versions

1:4.*
1:4.1.5.1-1ubuntu6
1:4.1.5.1-1ubuntu7
1:4.1.5.1-1ubuntu8
1:4.1.5.1-1ubuntu9
1:4.1.5.1-1ubuntu9.1
1:4.1.5.1-1ubuntu9.2
1:4.1.5.1-1ubuntu9.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:4.1.5.1-1ubuntu9.5",
            "binary_name": "login"
        },
        {
            "binary_version": "1:4.1.5.1-1ubuntu9.5",
            "binary_name": "passwd"
        },
        {
            "binary_version": "1:4.1.5.1-1ubuntu9.5",
            "binary_name": "uidmap"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:14.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3276-2.json"

Ubuntu:16.04:LTS / shadow

Package

Name
shadow
Purl
pkg:deb/ubuntu/shadow@1:4.2-3.1ubuntu5.3?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2-3.1ubuntu5.3

Affected versions

1:4.*
1:4.1.5.1-1.1ubuntu7
1:4.2-3.1ubuntu1
1:4.2-3.1ubuntu2
1:4.2-3.1ubuntu3
1:4.2-3.1ubuntu4
1:4.2-3.1ubuntu5
1:4.2-3.1ubuntu5.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:4.2-3.1ubuntu5.3",
            "binary_name": "login"
        },
        {
            "binary_version": "1:4.2-3.1ubuntu5.3",
            "binary_name": "passwd"
        },
        {
            "binary_version": "1:4.2-3.1ubuntu5.3",
            "binary_name": "uidmap"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3276-2.json"