Description
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2006-3374 | passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits. |
Ubuntu USN |
USN-308-1 | shadow vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T18:23:21.269Z
Reserved: 2006-07-06T00:00:00.000Z
Link: CVE-2006-3378
No data.
Status : Modified
Published: 2006-07-06T20:05:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-3378
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN