First published: Mon Jun 19 2023(Updated: )
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/shadow | <=1:4.5-1.1<=1:4.8.1-1<=1:4.13+dfsg1-1 | 1:4.13+dfsg1-4 |
ubuntu/shadow | <1:4.5-1ubuntu2.5+ | 1:4.5-1ubuntu2.5+ |
ubuntu/shadow | <1:4.8.1-1ubuntu5.20.04.5 | 1:4.8.1-1ubuntu5.20.04.5 |
ubuntu/shadow | <1:4.8.1-2ubuntu2.2 | 1:4.8.1-2ubuntu2.2 |
ubuntu/shadow | <1:4.13+dfsg1-1ubuntu1.1 | 1:4.13+dfsg1-1ubuntu1.1 |
ubuntu/shadow | <1:4.1.5.1-1ubuntu9.5+ | 1:4.1.5.1-1ubuntu9.5+ |
ubuntu/shadow | <1:4.13+dfsg1-2<4.14.0 | 1:4.13+dfsg1-2 4.14.0 |
ubuntu/shadow | <1:4.2-3.1ubuntu5.5+ | 1:4.2-3.1ubuntu5.5+ |
redhat/shadow-utils | <4.14.0 | 4.14.0 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 | |
Debian Shadow | <4.14.0 | |
Red Hat CodeReady Linux Builder | =8.0 | |
Red Hat CodeReady Linux Builder | =9.0 | |
Red Hat CodeReady Linux Builder for ARM 64 | =8.0_aarch64 | |
Red Hat CodeReady Linux Builder for ARM 64 | =9.0_aarch64 | |
Red Hat CodeReady Linux Builder for IBM z Systems | =8.0_s390x | |
Red Hat CodeReady Linux Builder for IBM z Systems | =9.0_s390x | |
Red Hat CodeReady Linux Builder for Power, little endian | =8.0_ppc64le | |
Red Hat CodeReady Linux Builder for Power, little endian | =9.0_ppc64le | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems | =9.0_s390x | |
Red Hat Enterprise Linux for Power, little endian | =8.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian | =9.0_ppc64le |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4641 is classified as a medium severity vulnerability.
To fix CVE-2023-4641, update shadow-utils to version 1:4.13+dfsg1-4 or higher.
CVE-2023-4641 can potentially allow attackers to retrieve sensitive passwords from memory.
Versions of shadow-utils up to 4.14.0 are affected by CVE-2023-4641.
CVE-2023-4641 affects multiple versions of Debian and Ubuntu operating systems.