A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6632 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7112 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0417 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2577 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-4641 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2215945 | issue tracking |