Source: shadow Version: 1:4.13+dfsg1-1 Severity: important Tags: security upstream Forwarded: https://github.com/shadow-maint/shadow/issues/1157 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for shadow. CVE-2024-56433[0]: | shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default | /etc/subuid behavior (e.g., uid 100000 through 165535 for the first | user account) that can realistically conflict with the uids of users | defined on locally administered networks, potentially leading to | account takeover, e.g., by leveraging newuidmap for access to an NFS | home directory (or same-host resources in the case of remote logins | by these local network users). NOTE: it may also be argued that | system administrators should not have assigned uids, within local | networks, that are within the range that can occur in /etc/subuid. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. Thought this will not really be fixable in code, it depends on how uids were assigned in within a group of systems form system administrators. Let's link downstream bugreport and upstream and maybe they come up with a documentation update reflecting the issue? For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-56433 https://www.cve.org/CVERecord?id=CVE-2024-56433 [1] https://github.com/shadow-maint/shadow/issues/1157 Regards, Salvatore _______________________________________________ Pkg-shadow-devel mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-shadow-devel
