Search CVE reports
11 – 20 of 26 results
CVE-2018-7169
Low prioritySome fixes available 3 of 7
An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a...
1 affected package
shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | Not affected | Not affected | Fixed | Fixed |
CVE-2017-15924
Medium priorityIn manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config,...
1 affected package
shadowsocks-libev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadowsocks-libev | — | — | — | Not affected | Not in release |
CVE-2017-12424
Low prioritySome fixes available 2 of 4
In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other...
1 affected package
shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | Not affected | Not affected | Not affected | Fixed |
CVE-2017-2616
Medium prioritySome fixes available 8 of 13
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
2 affected packages
shadow, util-linux
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | — | — | Fixed | Fixed |
util-linux | — | — | — | Not affected | Not affected |
CVE-2016-6252
Medium prioritySome fixes available 4 of 6
Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
1 affected package
shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | — | — | — | Fixed |
CVE-2011-0721
Medium priorityMultiple CRLF injection vulnerabilities in (1) chfn and (2) chsh in shadow 1:4.1.4 allow local users to add new users or groups to /etc/passwd via the GECOS field.
1 affected package
shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | — | — | — | — |
CVE-2010-1151
Medium priorityRace condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper...
1 affected package
libapache2-mod-auth-shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libapache2-mod-auth-shadow | — | — | — | — | — |
CVE-2008-5394
Medium priority/bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line...
1 affected package
shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | — | — | — | — |
CVE-2008-5104
High priorityUbuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which...
1 affected package
shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | — | — | — | — |
CVE-2006-3597
Unknown prioritypasswd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the "Go Back" option after the final "Installation complete" message and uses the main menu, which...
1 affected package
shadow
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
shadow | — | — | — | — | — |