Debian Package Tracker
Register | Log in
Subscribe

shadow

Choose email to subscribe with

general
  • source: shadow (main)
  • version: 1:4.17.4-2
  • maintainer: Shadow package maintainers (archive) (DMD)
  • uploaders: Serge Hallyn [DMD] – Chris Hofstaedtler [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:4.5-1.1
  • oldstable: 1:4.8.1-1
  • old-sec: 1:4.8.1-1+deb11u1
  • stable: 1:4.13+dfsg1-1
  • stable-p-u: 1:4.13+dfsg1-1+deb12u1
  • testing: 1:4.17.4-2
  • unstable: 1:4.17.4-2
versioned links
  • 1:4.5-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.8.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.8.1-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.13+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.13+dfsg1-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:4.17.4-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libsubid-dev
  • libsubid5
  • login.defs (2 bugs: 0, 1, 1, 0)
  • passwd (20 bugs: 0, 13, 7, 0)
  • uidmap (1 bugs: 0, 1, 0, 0)
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2024-56433: shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
Created: 2024-12-26 Last update: 2025-04-29 04:57
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2024-56433: shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
Created: 2024-12-26 Last update: 2025-04-29 04:57
debian/patches: 1 patch with invalid metadata, 11 patches to forward upstream high

Among the 13 debian patches available in version 1:4.17.4-2 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
  • 11 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-04-19 19:30
5 bugs tagged patch in the BTS normal
The BTS contains patches fixing 5 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-05-15 20:32
Depends on packages which need a new maintainer normal
The packages that shadow depends on which need a new maintainer are:
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2023-09-01 Last update: 2025-05-15 19:31
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:32
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2024-56433: (needs triaging) shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

You can find information about how to handle this issue in the security team's documentation.

2 issues that should be fixed with the next stable update:
  • CVE-2023-4641: A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
  • CVE-2023-29383: In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
Created: 2023-06-10 Last update: 2025-04-29 04:57
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-04-19 16:00
news
[rss feed]
  • [2025-05-10] Accepted shadow 1:4.13+dfsg1-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Christian Hofstaedtler)
  • [2025-04-29] shadow 1:4.17.4-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-19] Accepted shadow 1:4.17.4-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-04-18] Accepted shadow 1:4.8.1-1+deb11u1 (source) into oldstable-security (Sylvain Beucler)
  • [2025-04-10] shadow 1:4.17.4-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-05] Accepted shadow 1:4.17.4-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-04-03] shadow 1:4.17.3-3 MIGRATED to testing (Debian testing watch)
  • [2025-03-28] Accepted shadow 1:4.17.3-3 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-03-23] shadow 1:4.17.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-16] Accepted shadow 1:4.17.3-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-03-03] shadow 1:4.17.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-24] Accepted shadow 1:4.17.3-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-02-24] Accepted shadow 1:4.17.2-6 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-02-23] shadow 1:4.17.2-5 MIGRATED to testing (Debian testing watch)
  • [2025-02-17] Accepted shadow 1:4.17.2-5 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-02-17] Accepted shadow 1:4.17.2-4 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-02-16] Accepted shadow 1:4.17.2-3 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-02-15] Accepted shadow 1:4.17.2-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-02-09] Accepted shadow 1:4.17.2-1 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-01-08] Accepted shadow 1:4.17.1-2 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-01-04] Accepted shadow 1:4.17.1-1 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-12-28] Accepted shadow 1:4.17.0-1 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-12-22] Accepted shadow 1:4.17.0~rc1-2 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-12-11] shadow 1:4.16.0-7 MIGRATED to testing (Debian testing watch)
  • [2024-12-06] Accepted shadow 1:4.17.0~rc1-1 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-12-06] Accepted shadow 1:4.16.0-7 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-12-06] Accepted shadow 1:4.16.0-6 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-11-21] shadow 1:4.16.0-5 MIGRATED to testing (Debian testing watch)
  • [2024-11-15] Accepted shadow 1:4.16.0-5 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-08-28] shadow 1:4.16.0-4 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 36
  • RC: 0
  • I&N: 19
  • M&W: 17
  • F&P: 0
  • patch: 5
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (46, 56)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:4.16.0-7ubuntu1
  • 91 bugs (3 patches)
  • patches for 1:4.16.0-7ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing