Search for packages
Package details: pkg:deb/debian/shadow@1:4.8.1-1
purl pkg:deb/debian/shadow@1:4.8.1-1
Next non-vulnerable version 1:4.13+dfsg1-1+deb12u1
Latest non-vulnerable version 1:4.17.4-2
Risk 2.5
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-5u13-xzak-aaac
Aliases:
CVE-2023-4641
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
1:4.13+dfsg1-1
Affected by 2 other vulnerabilities.
1:4.13+dfsg1-1+deb12u1
Affected by 0 other vulnerabilities.
1:4.13+dfsg1-4
Affected by 0 other vulnerabilities.
1:4.16.0-4
Affected by 0 other vulnerabilities.
1:4.16.0-5
Affected by 0 other vulnerabilities.
1:4.16.0-7
Affected by 0 other vulnerabilities.
1:4.17.3-3
Affected by 0 other vulnerabilities.
1:4.17.4-1
Affected by 0 other vulnerabilities.
1:4.17.4-2
Affected by 0 other vulnerabilities.
VCID-ve96-dzxq-aaak
Aliases:
CVE-2013-4235
shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
1:4.13+dfsg1-1
Affected by 2 other vulnerabilities.
1:4.13+dfsg1-1+deb12u1
Affected by 0 other vulnerabilities.
VCID-wtbj-a4a5-aaan
Aliases:
CVE-2023-29383
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
1:4.13+dfsg1-1
Affected by 2 other vulnerabilities.
1:4.13+dfsg1-1+deb12u1
Affected by 0 other vulnerabilities.
1:4.13+dfsg1-3
Affected by 0 other vulnerabilities.
1:4.13+dfsg1-4
Affected by 0 other vulnerabilities.
1:4.16.0-4
Affected by 0 other vulnerabilities.
1:4.16.0-5
Affected by 0 other vulnerabilities.
1:4.16.0-7
Affected by 0 other vulnerabilities.
1:4.17.3-3
Affected by 0 other vulnerabilities.
1:4.17.4-1
Affected by 0 other vulnerabilities.
1:4.17.4-2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-6xbe-6b1x-aaah shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8). CVE-2019-19882
VCID-n6ua-k7jb-aaap An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation. CVE-2018-7169

Date Actor Action Vulnerability Source VulnerableCode Version
2025-06-21T08:49:19.310349+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac None 36.1.3
2025-06-21T04:51:29.940281+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T03:46:08.510910+00:00 Debian Oval Importer Fixing VCID-n6ua-k7jb-aaap None 36.1.3
2025-06-21T03:19:05.551069+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap None 36.1.3
2025-06-21T01:17:46.468518+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T00:39:40.167813+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak None 36.1.3
2025-06-20T23:40:49.670488+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan None 36.1.3
2025-06-20T23:18:27.703912+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-20T20:26:53.932602+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-07T21:20:25.175993+00:00 Debian Oval Importer Fixing VCID-n6ua-k7jb-aaap None 36.1.0
2025-06-05T14:17:03.185971+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 36.1.0
2025-04-26T08:10:02.834037+00:00 Debian Oval Importer Affected by VCID-5u13-xzak-aaac https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-26T08:10:01.427180+00:00 Debian Oval Importer Affected by VCID-wtbj-a4a5-aaan https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-13T02:20:18.299074+00:00 Debian Oval Importer Fixing VCID-6xbe-6b1x-aaah https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-12T21:35:53.390725+00:00 Debian Oval Importer Fixing VCID-n6ua-k7jb-aaap https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.0.0
2025-04-07T19:50:16.740107+00:00 Debian Oval Importer Fixing VCID-n6ua-k7jb-aaap None 36.0.0
2025-04-05T06:05:27.778724+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac None 36.0.0
2025-04-04T07:40:49.291882+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-04T06:06:48.575760+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap None 36.0.0
2025-04-04T04:01:41.743970+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-04T03:22:39.018991+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak None 36.0.0
2025-04-04T02:21:58.281790+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan None 36.0.0
2025-04-04T01:58:46.358385+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-03T23:16:03.470402+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-02-21T14:24:46.153685+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac None 35.1.0
2025-02-21T14:24:36.042178+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-21T10:53:49.592581+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan None 35.1.0
2025-02-21T10:53:43.280956+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-19T04:13:47.088250+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap None 35.1.0
2025-02-19T04:13:45.686302+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap https://security-tracker.debian.org/tracker/data/json 35.1.0
2025-02-18T11:34:47.705508+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak None 35.1.0
2025-02-18T11:34:46.991894+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 35.1.0
2024-11-24T03:30:24.429438+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-24T00:20:07.611187+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-21T09:18:37.400569+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 35.0.0
2024-11-19T09:05:11.298564+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 34.3.2
2024-10-11T00:54:00.912891+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-10T22:09:29.346370+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-10-08T09:58:55.843583+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 34.0.2
2024-09-23T07:58:42.605305+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-20T05:24:05.557623+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-09-20T02:59:54.955961+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 34.0.1
2024-04-26T05:50:42.143948+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac None 34.0.0rc4
2024-04-26T05:50:41.274700+00:00 Debian Importer Affected by VCID-5u13-xzak-aaac https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-26T02:54:00.416372+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan None 34.0.0rc4
2024-04-26T02:53:58.767516+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-24T13:31:29.640719+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap None 34.0.0rc4
2024-04-24T13:31:28.850906+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-24T08:37:36.263619+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 34.0.0rc4
2024-04-24T08:37:34.630806+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak None 34.0.0rc4
2024-01-12T12:54:41.888092+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan None 34.0.0rc2
2024-01-12T12:54:41.033527+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-10T16:07:26.632082+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-10T16:07:24.862240+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap None 34.0.0rc2
2024-01-10T10:33:24.310007+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 34.0.0rc2
2024-01-10T10:33:00.819484+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak None 34.0.0rc2
2024-01-05T08:36:09.324193+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan None 34.0.0rc1
2024-01-05T08:36:08.458100+00:00 Debian Importer Affected by VCID-wtbj-a4a5-aaan https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-04T06:06:00.134158+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-04T06:05:59.321798+00:00 Debian Importer Fixing VCID-n6ua-k7jb-aaap None 34.0.0rc1
2024-01-04T02:57:35.511336+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak https://security-tracker.debian.org/tracker/data/json 34.0.0rc1
2024-01-04T02:57:25.343817+00:00 Debian Importer Affected by VCID-ve96-dzxq-aaak None 34.0.0rc1