Improper Authentication Affecting shadow-utils package, versions <2:4.6-19.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-SHADOWUTILS-6082011
- published 23 Nov 2023
- disclosed 27 Dec 2023
Introduced: 23 Nov 2023
CVE-2023-4641 Open this link in a new tabHow to fix?
Upgrade Oracle:8
shadow-utils
to version 2:4.6-19.el8 or higher.
This issue was patched in ELSA-2023-7112
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow-utils
package and not the shadow-utils
package as distributed by Oracle
.
See How to fix?
for Oracle:8
relevant fixed versions and status.
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
References
- https://linux.oracle.com/cve/CVE-2023-4641.html
- https://linux.oracle.com/errata/ELSA-2023-6632.html
- https://access.redhat.com/errata/RHSA-2023:6632
- https://access.redhat.com/errata/RHSA-2023:7112
- https://access.redhat.com/security/cve/CVE-2023-4641
- https://bugzilla.redhat.com/show_bug.cgi?id=2215945
- https://access.redhat.com/errata/RHSA-2024:0417
- https://access.redhat.com/errata/RHSA-2024:2577