Search CVE reports


Toggle filters

1 – 10 of 28 results


CVE-2024-56433

Low priority
Vulnerable

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally...

1 affected package

shadow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadow Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2023-4641

Low priority

Some fixes available 6 of 7

A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may...

1 affected package

shadow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadow Not affected Fixed Fixed Fixed
Show less packages

CVE-2023-29383

Low priority
Vulnerable

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the...

1 affected package

shadow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadow Not affected Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2023-0634

Negligible priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

1 affected package

shadow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadow Not affected Not affected Not affected
Show less packages

CVE-2019-5164

Medium priority
Needs evaluation

An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and...

1 affected package

shadowsocks-libev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadowsocks-libev Not affected Not affected Not affected Needs evaluation
Show less packages

CVE-2019-5163

Medium priority
Needs evaluation

An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit....

1 affected package

shadowsocks-libev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadowsocks-libev Not affected Not affected Not affected Needs evaluation
Show less packages

CVE-2019-5152

Medium priority
Needs evaluation

An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound...

1 affected package

shadowsocks-libev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadowsocks-libev Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2019-19882

Medium priority
Not affected

shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled...

1 affected package

shadow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadow Not affected
Show less packages

CVE-2018-7169

Low priority

Some fixes available 3 of 7

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a...

1 affected package

shadow

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadow Not affected Not affected Fixed
Show less packages

CVE-2017-2616

Medium priority

Some fixes available 8 of 13

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.

2 affected packages

shadow, util-linux

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
shadow Fixed
util-linux Not affected
Show less packages