Vulnerabilities affecting this package (0)
Vulnerability |
Summary |
Fixed by |
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (2)
Vulnerability |
Summary |
Aliases |
VCID-5u13-xzak-aaac
|
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
|
CVE-2023-4641
|
VCID-wtbj-a4a5-aaan
|
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
|
CVE-2023-29383
|