Low
Canonical Ubuntu
Florian Weimer discovered that shadow was not properly copying and removing user directory trees, which could lead to a race condition. A local attacker could possibly use this issue to setup a symlink attack and alter or remove directories without authorization. Update Instructions: Run sudo pro fix USN-5745-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: passwd – 1:4.2-3.1ubuntu5.5+esm2 login – 1:4.2-3.1ubuntu5.5+esm2 uidmap – 1:4.2-3.1ubuntu5.5+esm2 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2013-4235.
Severity is low unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2022-12-07: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.150 | |
cflinuxfs3 | lt | 0.341.0 | |
jammy stemcells | lt | 1.55 | |
cf deployment | lt | 24.0.0 |