ALT-PU-2017-2150-1
Closed vulnerabilities
BDU:2021-05844
Уязвимость инструмента newusers утилиты для управления учетными записями shadow, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05845
Уязвимость утилиты для управления учетными записями shadow, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-12424
In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630
- https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675
- https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675
- https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
- https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
- [debian-lts-announce] 20210317 [SECURITY] [DLA 2596-1] shadow security update
- [debian-lts-announce] 20210317 [SECURITY] [DLA 2596-1] shadow security update
- GLSA-201710-16
- GLSA-201710-16
Modified: 2024-11-21
CVE-2017-20002
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957
- [debian-lts-announce] 20210317 [SECURITY] [DLA 2596-1] shadow security update
- [debian-lts-announce] 20210317 [SECURITY] [DLA 2596-1] shadow security update