Bugzilla – Bug 1214806
VUL-0: CVE-2023-4641: shadow: possible password leak during passwd(1) change
Last modified: 2024-05-14 14:56:18 UTC
CVE-2023-4641 When gpasswd(1) asks for the new password, it asks twice (as is usual for confirming the new password). Each of those 2 password prompts uses agetpass() to get the password. If the second agetpass() fails, the first password, which has been copied into the 'static' buffer 'pass' via STRFCPY(), wasn't being zeroed. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4641 https://bugzilla.redhat.com/show_bug.cgi?id=2215945
Upstream fix: https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904
shadow.SUSE_SLE-12-SP2_Update 4.2.1 SR#307211 shadow.SUSE_SLE-12-SP5_Update 4.2.1 SR#307212 shadow.SUSE_SLE-12_Update 4.1.5 SR#307213 shadow.SUSE_SLE-15-SP1_Update 4.6 SR#307214 shadow.SUSE_SLE-15-SP3_Update 4.8.1 SR#307215 shadow.SUSE_SLE-15-SP4_Update 4.8.1 SR#307216 SUSE_SLE-15-SP4_Update_Products_Micro54_Update 4.8.1 SR#307217 shadow.SUSE_SLE-15_Update 4.5 SR#307218
SUSE-SU-2023:3591-1: An update that solves one vulnerability can now be installed. Category: security (low) Bug References: 1214806 CVE References: CVE-2023-4641 Sources used: SUSE Linux Enterprise Micro for Rancher 5.4 (src): shadow-4.8.1-150400.3.3.1 SUSE Linux Enterprise Micro 5.4 (src): shadow-4.8.1-150400.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4025-1: An update that solves one vulnerability can now be installed. Category: security (low) Bug References: 1214806 CVE References: CVE-2023-4641 Sources used: SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): shadow-4.6-150100.3.11.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): shadow-4.6-150100.3.11.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): shadow-4.6-150100.3.11.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): shadow-4.6-150100.3.11.1 SUSE Enterprise Storage 7 (src): shadow-4.6-150100.3.11.1 SUSE CaaS Platform 4.0 (src): shadow-4.6-150100.3.11.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): shadow-4.6-150100.3.11.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): shadow-4.6-150100.3.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4024-1: An update that solves one vulnerability can now be installed. Category: security (low) Bug References: 1214806 CVE References: CVE-2023-4641 Sources used: openSUSE Leap 15.4 (src): shadow-4.8.1-150400.10.12.1 openSUSE Leap 15.5 (src): shadow-4.8.1-150400.10.12.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): shadow-4.8.1-150400.10.12.1 SUSE Linux Enterprise Micro 5.3 (src): shadow-4.8.1-150400.10.12.1 Basesystem Module 15-SP4 (src): shadow-4.8.1-150400.10.12.1 Basesystem Module 15-SP5 (src): shadow-4.8.1-150400.10.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4023-1: An update that solves one vulnerability can now be installed. Category: security (low) Bug References: 1214806 CVE References: CVE-2023-4641 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): shadow-4.2.1-36.6.1 SUSE Linux Enterprise Server 12 SP5 (src): shadow-4.2.1-36.6.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): shadow-4.2.1-36.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4027-1: An update that solves one vulnerability can now be installed. Category: security (low) Bug References: 1214806 CVE References: CVE-2023-4641 Sources used: SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): shadow-4.8.1-150300.4.12.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): shadow-4.8.1-150300.4.12.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): shadow-4.8.1-150300.4.12.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): shadow-4.8.1-150300.4.12.1 SUSE Manager Proxy 4.2 (src): shadow-4.8.1-150300.4.12.1 SUSE Manager Retail Branch Server 4.2 (src): shadow-4.8.1-150300.4.12.1 SUSE Manager Server 4.2 (src): shadow-4.8.1-150300.4.12.1 SUSE Enterprise Storage 7.1 (src): shadow-4.8.1-150300.4.12.1 SUSE Linux Enterprise Micro 5.1 (src): shadow-4.8.1-150300.4.12.1 SUSE Linux Enterprise Micro 5.2 (src): shadow-4.8.1-150300.4.12.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): shadow-4.8.1-150300.4.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1007-1: An update that solves two vulnerabilities and has seven security fixes can now be installed. Category: security (moderate) Bug References: 1144060, 1176006, 1188307, 1203823, 1205502, 1206627, 1210507, 1213189, 1214806 CVE References: CVE-2023-29383, CVE-2023-4641 Maintenance Incident: [SUSE:Maintenance:32887](https://smelt.suse.de/incident/32887/) Sources used: SUSE Linux Enterprise Micro 5.5 (src): shadow-4.8.1-150500.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done, closing