Debian Package Tracker
Register | Log in
Subscribe

shadow

Choose email to subscribe with

general
  • source: shadow (main)
  • version: 1:4.13+dfsg1-1
  • maintainer: Shadow package maintainers (archive) (DMD)
  • uploaders: Serge Hallyn [DMD] – Balint Reczey [DMD]
  • arch: any
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1:4.5-1.1
  • stable: 1:4.8.1-1
  • testing: 1:4.13+dfsg1-1
  • unstable: 1:4.13+dfsg1-1
versioned links
  • 1:4.5-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.8.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.13+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libsubid-dev
  • libsubid4
  • login (13 bugs: 0, 8, 5, 0)
  • passwd (27 bugs: 0, 19, 8, 0)
  • uidmap (1 bugs: 0, 1, 0, 0)
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2023-29383: In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
Created: 2023-04-15 Last update: 2023-04-17 00:06
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2023-29383: In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
Created: 2023-04-15 Last update: 2023-04-17 00:06
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2019-03-21 Last update: 2023-05-17 14:05
6 bugs tagged patch in the BTS normal
The BTS contains patches fixing 6 bugs, consider including or untagging them.
Created: 2022-07-27 Last update: 2023-05-17 14:05
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 095f9d48ef2502cf62620443ccf80feb186b857c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Nov 11 21:17:16 2022 +0100

    debian/gitlab-ci.yml: Use sudo to fix reprotest test
Created: 2022-11-11 Last update: 2023-05-13 21:00
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-11-12 Last update: 2023-02-03 10:40
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2023-29383: (needs triaging) In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

You can find information about how to handle this issue in the security team's documentation.

Created: 2023-04-15 Last update: 2023-04-17 00:06
debian/patches: 10 patches to forward upstream low

Among the 11 debian patches available in version 1:4.13+dfsg1-1 of the package, we noticed the following issues:

  • 10 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-27 20:59
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2022-12-17 19:18
news
[rss feed]
  • [2022-11-17] shadow 1:4.13+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-11] Accepted shadow 1:4.13+dfsg1-1 (source) into unstable (Balint Reczey)
  • [2022-11-11] shadow 1:4.12.3+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2022-11-05] Accepted shadow 1:4.12.3+dfsg1-3 (source) into unstable (Balint Reczey)
  • [2022-10-28] shadow 1:4.12.3+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-22] Accepted shadow 1:4.12.3+dfsg1-2 (source) into unstable (Balint Reczey)
  • [2022-10-10] shadow 1:4.12.3+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-04] Accepted shadow 1:4.12.3+dfsg1-1 (source) into unstable (Balint Reczey)
  • [2022-03-09] shadow 1:4.11.1+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2022-03-03] Accepted shadow 1:4.11.1+dfsg1-2 (source) into unstable (Balint Reczey)
  • [2022-02-02] shadow 1:4.11.1+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-31] Accepted shadow 1:4.11.1+dfsg1-1 (source) into unstable (Balint Reczey)
  • [2022-01-24] Accepted shadow 1:4.11.1+dfsg1-0exp1 (source amd64) into experimental, experimental (Debian FTP Masters) (signed by: Balint Reczey)
  • [2021-11-16] shadow 1:4.8.1-2 MIGRATED to testing (Debian testing watch)
  • [2021-11-11] Accepted shadow 1:4.8.1-2 (source) into unstable (Balint Reczey)
  • [2021-11-08] shadow 1:4.8.1-1.1 MIGRATED to testing (Debian testing watch)
  • [2021-11-02] Accepted shadow 1:4.8.1-1.1 (source) into unstable (Johannes Schauer Marin Rodrigues)
  • [2021-03-17] Accepted shadow 1:4.4-4.1+deb9u1 (source) into oldstable (Sylvain Beucler)
  • [2020-02-13] shadow 1:4.8.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-02-07] Accepted shadow 1:4.8.1-1 (source) into unstable (Balint Reczey)
  • [2020-01-06] shadow 1:4.8-1 MIGRATED to testing (Debian testing watch)
  • [2019-12-20] Accepted shadow 1:4.8-1 (source) into unstable (Balint Reczey)
  • [2019-07-22] shadow 1:4.7-2 MIGRATED to testing (Debian testing watch)
  • [2019-07-16] Accepted shadow 1:4.7-2 (source) into unstable (Balint Reczey)
  • [2019-07-14] shadow 1:4.7-1 MIGRATED to testing (Debian testing watch)
  • [2019-07-08] Accepted shadow 1:4.7-1 (source) into unstable (Balint Reczey)
  • [2018-08-03] shadow 1:4.5-1.1 MIGRATED to testing (Debian testing watch)
  • [2018-07-27] Accepted shadow 1:4.5-1.1 (source amd64) into unstable (Andreas Henriksson)
  • [2017-10-03] shadow 1:4.5-1 MIGRATED to testing (Debian testing watch)
  • [2017-09-27] Accepted shadow 1:4.5-1 (source) into unstable (Balint Reczey)
  • 1
  • 2
bugs [bug history graph]
  • all: 59 60
  • RC: 0
  • I&N: 34 35
  • M&W: 25
  • F&P: 0
  • patch: 6
  • help: 1
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (35, 57)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:4.13+dfsg1-1ubuntu1
  • 85 bugs (3 patches)
  • patches for 1:4.13+dfsg1-1ubuntu1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing