Bug 2334165 (CVE-2024-56433) - CVE-2024-56433 shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise
Summary: CVE-2024-56433 shadow-utils: Default subordinate ID configuration in /etc/log...
Keywords:
Status: NEW
Alias: CVE-2024-56433
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2334168 2334169
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-26 09:01 UTC by OSIDB Bzimport
Modified: 2025-05-28 16:43 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-12-26 09:01:18 UTC
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.


Note You need to log in before you can comment on or make changes to this bug.