Debian Package Tracker
Register | Log in
Subscribe

shadow

Choose email to subscribe with

general
  • source: shadow (main)
  • version: 1:4.13+dfsg1-2
  • maintainer: Shadow package maintainers (archive) (DMD)
  • uploaders: Balint Reczey [DMD] – Serge Hallyn [DMD]
  • arch: any
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:4.5-1.1
  • oldstable: 1:4.8.1-1
  • stable: 1:4.13+dfsg1-1
  • testing: 1:4.13+dfsg1-2
  • unstable: 1:4.13+dfsg1-2
versioned links
  • 1:4.5-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.8.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.13+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.13+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libsubid-dev
  • libsubid4
  • login (16 bugs: 0, 10, 6, 0)
  • passwd (29 bugs: 0, 19, 10, 0)
  • uidmap (1 bugs: 0, 1, 0, 0)
action needed
A new upstream version is available: 4.14.0-rc5 high
A new upstream version 4.14.0-rc5 is available, you should consider packaging it.
Created: 2023-08-06 Last update: 2023-10-08 02:41
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2019-03-21 Last update: 2023-10-08 02:34
9 bugs tagged patch in the BTS normal
The BTS contains patches fixing 9 bugs, consider including or untagging them.
Created: 2023-09-13 Last update: 2023-10-08 02:34
Depends on packages which need a new maintainer normal
The packages that shadow depends on which need a new maintainer are:
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2023-09-01 Last update: 2023-10-08 02:21
12 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 25f0b936c01a6214f377ad2e8f32397c38c937ac
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Wed Sep 27 10:22:26 2023 +0200

    Remove myself from uploaders

commit 776d4d23acf5c440579aa11ee7533f778e2b9f68
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Tue Sep 26 22:02:45 2023 +0200

    Update changelog

commit 9f285306f3cf3a18b3912421d006bffc6d4d2209
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Tue Sep 26 12:19:29 2023 +0200

    Fix valid_field() that regressed in upstream's first CVE fix
    
    cherry-picking upstream's regression fix.
    
    Follow-up for commit 50defcfa5d79a021a6a22afb6102f4c31ee549c2 .
    
    Gbp-Dch: Ignore

commit f569ea06ff27516c09b464b3ce8e12bd7ac754a3
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Sep 25 18:18:48 2023 +0200

    Update changelog

commit 50defcfa5d79a021a6a22afb6102f4c31ee549c2
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Sep 25 18:13:40 2023 +0200

    Cherry-pick upstream patch to fix chfn vulnerability
    
    (CVE-2023-29383)
    
    Closes: #1034482

commit 56c75026863af1c37d9e75e51b61d69d5696b9e7
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Sep 25 17:55:00 2023 +0200

    Cherry-pick upstream patch to fix gpasswd passwd leak
    
    (CVE-2023-4641)
    
    Closes: #1051062

commit 7c66acdd2e9e500a9d57f61329bb590b865042e1
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Sep 25 17:41:27 2023 +0200

    Update changelog

commit 48066453165711514dd1ad039097807aa0576558
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Sep 25 17:15:46 2023 +0200

    debian/NEWS: Fix false claim about PREVENT_NO_AUTH affecting authentication
    
    Also drop setting PREVENT_NO_AUTH in shipped login.defs.
    
    Closes: #1041547

commit 05a41bc4d536a1c379ec6d21323b51e29c5f9a62
Merge: d7ce688 75eb241
Author: Balint Reczey <rbalint@debian.org>
Date:   Wed Sep 13 07:55:26 2023 +0000

    Merge branch 'bprofile-nodoc' into 'master'
    
    Support <nodoc> build profile (Closes: #1051827)
    
    See merge request debian/shadow!18

commit 75eb241552b88df55f64c508620342b1bbfb2b2e
Author: Gioele Barabucci <gioele@svario.it>
Date:   Wed Sep 13 08:36:38 2023 +0200

    Support <nodoc> build profile
    
    `xsltproc`, `docbook` and all other XML-related packages are not needed
    when the `<nodoc>` build profile is active, as long as `./configure` is
    called with `--disable-man`.
    
    Closes: #1051827

commit d7ce68863e6040696b5127aff533712fc7fcc256
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Sun Jul 2 20:59:28 2023 +0200

    debian/login.pam: Drop reference to Debian Etch
    
    Closes: #1040064

commit 095f9d48ef2502cf62620443ccf80feb186b857c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Nov 11 21:17:16 2022 +0100

    debian/gitlab-ci.yml: Use sudo to fix reprotest test
Created: 2022-11-11 Last update: 2023-10-06 06:16
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-11-12 Last update: 2023-02-03 10:40
2 low-priority security issues in bullseye low

There are 2 open security issues in bullseye.

2 issues left for the package maintainer to handle:
  • CVE-2023-4641: (needs triaging)
  • CVE-2023-29383: (needs triaging) In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-04-15 Last update: 2023-10-02 07:30
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2023-4641: (needs triaging)
  • CVE-2023-29383: (needs triaging) In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2023-10-02 07:30
debian/patches: 13 patches to forward upstream low

Among the 14 debian patches available in version 1:4.13+dfsg1-2 of the package, we noticed the following issues:

  • 13 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-09-27 16:38
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2023-09-27 14:25
news
[rss feed]
  • [2023-10-02] shadow 1:4.13+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2023-09-27] Accepted shadow 1:4.13+dfsg1-2 (source) into unstable (Balint Reczey)
  • [2022-11-17] shadow 1:4.13+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-11] Accepted shadow 1:4.13+dfsg1-1 (source) into unstable (Balint Reczey)
  • [2022-11-11] shadow 1:4.12.3+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2022-11-05] Accepted shadow 1:4.12.3+dfsg1-3 (source) into unstable (Balint Reczey)
  • [2022-10-28] shadow 1:4.12.3+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-22] Accepted shadow 1:4.12.3+dfsg1-2 (source) into unstable (Balint Reczey)
  • [2022-10-10] shadow 1:4.12.3+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-04] Accepted shadow 1:4.12.3+dfsg1-1 (source) into unstable (Balint Reczey)
  • [2022-03-09] shadow 1:4.11.1+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2022-03-03] Accepted shadow 1:4.11.1+dfsg1-2 (source) into unstable (Balint Reczey)
  • [2022-02-02] shadow 1:4.11.1+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-31] Accepted shadow 1:4.11.1+dfsg1-1 (source) into unstable (Balint Reczey)
  • [2022-01-24] Accepted shadow 1:4.11.1+dfsg1-0exp1 (source amd64) into experimental, experimental (Debian FTP Masters) (signed by: Balint Reczey)
  • [2021-11-16] shadow 1:4.8.1-2 MIGRATED to testing (Debian testing watch)
  • [2021-11-11] Accepted shadow 1:4.8.1-2 (source) into unstable (Balint Reczey)
  • [2021-11-08] shadow 1:4.8.1-1.1 MIGRATED to testing (Debian testing watch)
  • [2021-11-02] Accepted shadow 1:4.8.1-1.1 (source) into unstable (Johannes Schauer Marin Rodrigues)
  • [2021-03-17] Accepted shadow 1:4.4-4.1+deb9u1 (source) into oldstable (Sylvain Beucler)
  • [2020-02-13] shadow 1:4.8.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-02-07] Accepted shadow 1:4.8.1-1 (source) into unstable (Balint Reczey)
  • [2020-01-06] shadow 1:4.8-1 MIGRATED to testing (Debian testing watch)
  • [2019-12-20] Accepted shadow 1:4.8-1 (source) into unstable (Balint Reczey)
  • [2019-07-22] shadow 1:4.7-2 MIGRATED to testing (Debian testing watch)
  • [2019-07-16] Accepted shadow 1:4.7-2 (source) into unstable (Balint Reczey)
  • [2019-07-14] shadow 1:4.7-1 MIGRATED to testing (Debian testing watch)
  • [2019-07-08] Accepted shadow 1:4.7-1 (source) into unstable (Balint Reczey)
  • [2018-08-03] shadow 1:4.5-1.1 MIGRATED to testing (Debian testing watch)
  • [2018-07-27] Accepted shadow 1:4.5-1.1 (source amd64) into unstable (Andreas Henriksson)
  • 1
  • 2
bugs [bug history graph]
  • all: 65 66
  • RC: 0
  • I&N: 35 36
  • M&W: 30
  • F&P: 0
  • patch: 9
  • help: 1
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (35, 57)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:4.13+dfsg1-1ubuntu1
  • 86 bugs (3 patches)
  • patches for 1:4.13+dfsg1-1ubuntu1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing