Login
Newsletter
Werbung

Sicherheit: Mangelnde Eingabeprüfung in shadow
Aktuelle Meldungen Distributionen
Name: Mangelnde Eingabeprüfung in shadow
ID: SUSE-SU-2024:0939-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Micro 5.4, SUSE Linux Enterprise Micro for Rancher 5.4, SUSE openSUSE Leap Micro 5.4
Datum: Fr, 22. März 2024, 18:54
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29383
Applikationen: shadow

Originalnachricht

--===============4856962523440617108==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for shadow

Announcement ID: SUSE-SU-2024:0939-1
Rating: moderate
References:

* bsc#1144060
* bsc#1176006
* bsc#1188307
* bsc#1203823
* bsc#1205502
* bsc#1206627
* bsc#1210507
* bsc#1213189


Cross-References:

* CVE-2023-29383


CVSS scores:

* CVE-2023-29383 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-29383 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N


Affected Products:

* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.4



An update that solves one vulnerability and has seven security fixes can now be
installed.

## Description:

This update for shadow fixes the following issues:

* CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn
(bsc#1210507).

The following non-security bugs were fixed:

* bsc#1176006: Fix chage date miscalculation
* bsc#1188307: Fix passwd segfault
* bsc#1203823: Remove pam_keyinit from PAM config files
* bsc#1213189: Change lock mechanism to file locking to prevent lock files
after power interruptions
* bsc#1206627: Add --prefix support to passwd, chpasswd and chage
* bsc#1205502: useradd audit event user id field cannot be interpretedd

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-939=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-939=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-939=1

## Package List:

* openSUSE Leap Micro 5.4 (noarch)
* login_defs-4.8.1-150400.3.6.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* shadow-debuginfo-4.8.1-150400.3.6.1
* shadow-4.8.1-150400.3.6.1
* shadow-debugsource-4.8.1-150400.3.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* login_defs-4.8.1-150400.3.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* shadow-debuginfo-4.8.1-150400.3.6.1
* shadow-4.8.1-150400.3.6.1
* shadow-debugsource-4.8.1-150400.3.6.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* login_defs-4.8.1-150400.3.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* shadow-debuginfo-4.8.1-150400.3.6.1
* shadow-4.8.1-150400.3.6.1
* shadow-debugsource-4.8.1-150400.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2023-29383.html
* https://bugzilla.suse.com/show_bug.cgi?id=1144060
* https://bugzilla.suse.com/show_bug.cgi?id=1176006
* https://bugzilla.suse.com/show_bug.cgi?id=1188307
* https://bugzilla.suse.com/show_bug.cgi?id=1203823
* https://bugzilla.suse.com/show_bug.cgi?id=1205502
* https://bugzilla.suse.com/show_bug.cgi?id=1206627
* https://bugzilla.suse.com/show_bug.cgi?id=1210507
* https://bugzilla.suse.com/show_bug.cgi?id=1213189


--===============4856962523440617108==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for shadow</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:0939-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1144060">bsc#1144060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1176006">bsc#1176006</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1188307">bsc#1188307</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203823">bsc#1203823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205502">bsc#1205502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206627">bsc#1206627</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210507">bsc#1210507</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213189">bsc#1213189</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-29383.html">CVE-2023-29383</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-29383</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-29383</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
Micro 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro for Rancher 5.4</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves one vulnerability and has seven security
fixes can now be installed.</p>





<h2>Description:</h2>

<p>This update for shadow fixes the following issues:</p>
<ul>
<li>CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn
(bsc#1210507).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>bsc#1176006: Fix chage date miscalculation</li>
<li>bsc#1188307: Fix passwd segfault</li>
<li>bsc#1203823: Remove pam_keyinit from PAM config files</li>
<li>bsc#1213189: Change lock mechanism to file locking to prevent
lock files after power interruptions</li>
<li>bsc#1206627: Add --prefix support to passwd, chpasswd and
chage</li>
<li>bsc#1205502: useradd audit event user id field cannot be
interpretedd</li>
</ul>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap Micro 5.4


<br/>
<code>zypper in -t patch
openSUSE-Leap-Micro-5.4-2024-939=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.4


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.4-2024-939=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.4


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.4-2024-939=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap Micro 5.4 (noarch)
<ul>

<li>login_defs-4.8.1-150400.3.6.1</li>

</ul>
</li>

<li>
openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
<ul>


<li>shadow-debuginfo-4.8.1-150400.3.6.1</li>

<li>shadow-4.8.1-150400.3.6.1</li>


<li>shadow-debugsource-4.8.1-150400.3.6.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
<ul>

<li>login_defs-4.8.1-150400.3.6.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x
x86_64)
<ul>


<li>shadow-debuginfo-4.8.1-150400.3.6.1</li>

<li>shadow-4.8.1-150400.3.6.1</li>


<li>shadow-debugsource-4.8.1-150400.3.6.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.4 (noarch)
<ul>

<li>login_defs-4.8.1-150400.3.6.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
<ul>


<li>shadow-debuginfo-4.8.1-150400.3.6.1</li>

<li>shadow-4.8.1-150400.3.6.1</li>


<li>shadow-debugsource-4.8.1-150400.3.6.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-29383.html">https://www.suse.com/security/cve/CVE-2023-29383.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1144060">https://bugzilla.suse.com/show_bug.cgi?id=1144060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1176006">https://bugzilla.suse.com/show_bug.cgi?id=1176006</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1188307">https://bugzilla.suse.com/show_bug.cgi?id=1188307</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203823">https://bugzilla.suse.com/show_bug.cgi?id=1203823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205502">https://bugzilla.suse.com/show_bug.cgi?id=1205502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206627">https://bugzilla.suse.com/show_bug.cgi?id=1206627</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210507">https://bugzilla.suse.com/show_bug.cgi?id=1210507</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213189">https://bugzilla.suse.com/show_bug.cgi?id=1213189</a>
</li>


</ul>

</div>

--===============4856962523440617108==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung