Search for packages
Package details: pkg:deb/debian/shadow@1:4.1.1-6%2Blenny1
purl pkg:deb/debian/shadow@1:4.1.1-6%2Blenny1
Next non-vulnerable version 1:4.13+dfsg1-1+deb12u1
Latest non-vulnerable version 1:4.13+dfsg1-1+deb12u1
Risk 4.0
Vulnerabilities affecting this package (11)
Vulnerability Summary Fixed by
VCID-5jpw-599j-yudq
Aliases:
CVE-2017-20002
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
1:4.5-1.1
Affected by 4 other vulnerabilities.
VCID-6zz1-kwsv-ebhj
Aliases:
(+
CVE-2017-2616
fix)
regression
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
1:4.2-3+deb8u4
Affected by 8 other vulnerabilities.
1:4.4-4.1
Affected by 6 other vulnerabilities.
VCID-eqtu-vr9m-p3e1
Aliases:
CVE-2005-4890
coreutils: tty hijacking possible in "su" via TIOCSTI ioctl
1:4.1.5.1-1
Affected by 9 other vulnerabilities.
VCID-f6kk-8srm-2ff5
Aliases:
CVE-2023-29383
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
1:4.13+dfsg1-1+deb12u1
Affected by 0 other vulnerabilities.
VCID-g9tp-8ns8-nqbh
Aliases:
DSA-3793-2 shadow
regression update
1:4.2-3+deb8u4
Affected by 8 other vulnerabilities.
VCID-jhez-x1dt-yfb9
Aliases:
CVE-2017-12424
1:4.5-1.1
Affected by 4 other vulnerabilities.
VCID-nnyf-aage-eqfw
Aliases:
CVE-2016-6252
1:4.2-3+deb8u4
Affected by 8 other vulnerabilities.
1:4.4-4.1
Affected by 6 other vulnerabilities.
VCID-renf-hw6u-jfbz
Aliases:
CVE-2011-0721
1:4.1.5.1-1
Affected by 9 other vulnerabilities.
VCID-rq72-9b5w-tuff
Aliases:
CVE-2018-7169
An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.
1:4.8.1-1
Affected by 3 other vulnerabilities.
VCID-tec4-e138-dkck
Aliases:
CVE-2019-19882
shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8).
1:4.8.1-1
Affected by 3 other vulnerabilities.
VCID-x3n6-d6v2-cfge
Aliases:
CVE-2023-4641
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
1:4.13+dfsg1-1+deb12u1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-g3w3-a56m-87em CVE-2008-5394

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T19:13:47.405993+00:00 Debian Oval Importer Affected by VCID-tec4-e138-dkck https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:58:34.314347+00:00 Debian Oval Importer Affected by VCID-6zz1-kwsv-ebhj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:50:10.495168+00:00 Debian Oval Importer Affected by VCID-rq72-9b5w-tuff https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:38:18.165993+00:00 Debian Oval Importer Affected by VCID-x3n6-d6v2-cfge https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:22:33.118226+00:00 Debian Oval Importer Affected by VCID-eqtu-vr9m-p3e1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:20:25.886284+00:00 Debian Oval Importer Affected by VCID-jhez-x1dt-yfb9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:43:04.891294+00:00 Debian Oval Importer Affected by VCID-renf-hw6u-jfbz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:44:48.315252+00:00 Debian Oval Importer Fixing VCID-g3w3-a56m-87em https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:40:52.701505+00:00 Debian Oval Importer Affected by VCID-nnyf-aage-eqfw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:25:14.939183+00:00 Debian Oval Importer Affected by VCID-f6kk-8srm-2ff5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:11:57.446640+00:00 Debian Oval Importer Affected by VCID-5jpw-599j-yudq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T10:32:54.191073+00:00 Debian Oval Importer Affected by VCID-6zz1-kwsv-ebhj https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:13:41.084800+00:00 Debian Oval Importer Affected by VCID-g9tp-8ns8-nqbh https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:52:38.836344+00:00 Debian Oval Importer Affected by VCID-nnyf-aage-eqfw https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0