CVE-2024-56433
Rocky Linux vulnerability analysis and mitigation

Overview

shadow-utils (aka shadow) versions 4.4 through 4.17.0 contains a vulnerability in its default /etc/subuid configuration. The software establishes default subordinate UID ranges (e.g., uid 100000 through 165535 for the first user account) that can potentially conflict with UIDs of users defined on locally administered networks (MITRE, NVD). This vulnerability was discovered in December 2024 and is currently marked as disputed.

Technical details

The vulnerability stems from the default configuration in /etc/login.defs that assigns subordinate UID ranges to local accounts. The default range starts at SUBUIDMIN 100000 with SUBUIDCOUNT 65536, which can overlap with existing network user IDs. This configuration allows local users to leverage newuidmap to gain access to resources owned by network users whose UIDs fall within the assigned subordinate range (Shadow Config). The vulnerability has been assigned a CVSS 3.1 Base Score of 3.6 LOW (Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N) (NVD).

Impact

The vulnerability can lead to account takeover by allowing local users to gain access to resources belonging to network users whose UIDs fall within the subordinate range. This includes potential access to NFS home directories or same-host resources in cases of remote logins by these network users (Shadow Issue).

Mitigation and workarounds

While no official fix has been released, system administrators should carefully review and potentially modify the default subordinate UID ranges in /etc/login.defs to ensure they don't conflict with UIDs used in their network environment. Some argue that system administrators should not assign UIDs within the range that can occur in /etc/subuid (NVD).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13020HIGH8.8
  • NixOSNixOS
  • firefox-x11
NoYesNov 11, 2025
CVE-2025-59088HIGH8.6
  • Rocky LinuxRocky Linux
  • idm:client::ipa-client
NoYesNov 12, 2025
CVE-2025-13019HIGH8.1
  • NixOSNixOS
  • firefox-x11
NoYesNov 11, 2025
CVE-2025-59089MEDIUM5.9
  • Rocky LinuxRocky Linux
  • idm:DL1::bind-dyndb-ldap
NoYesNov 12, 2025
CVE-2025-40185N/AN/A
  • Linux KernelLinux Kernel
  • linux-fips
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management