A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Shadow-utils | Shadow-maint | * | 4.14.0 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | shadow-utils-2:4.6-19.el8 | * |
Red Hat Enterprise Linux 8.6 Extended Update Support | RedHat | shadow-utils-2:4.6-17.el8_6 | * |
Red Hat Enterprise Linux 8.8 Extended Update Support | RedHat | shadow-utils-2:4.6-17.el8_8.2 | * |
Red Hat Enterprise Linux 9 | RedHat | shadow-utils-2:4.9-8.el9 | * |
Shadow | Ubuntu | bionic | * |
Shadow | Ubuntu | esm-infra/bionic | * |
Shadow | Ubuntu | esm-infra/xenial | * |
Shadow | Ubuntu | focal | * |
Shadow | Ubuntu | jammy | * |
Shadow | Ubuntu | lunar | * |
Shadow | Ubuntu | mantic | * |
Shadow | Ubuntu | trusty | * |
Shadow | Ubuntu | trusty/esm | * |
Shadow | Ubuntu | upstream | * |
Shadow | Ubuntu | xenial | * |