Name | CVE-2024-47191 |
Description | pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-5784-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
oath-toolkit (PTS) | bullseye | 2.6.6-3 | fixed |
bookworm, bookworm (security) | 2.6.7-3.1+deb12u1 | fixed | |
sid, trixie | 2.6.12-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
oath-toolkit | source | bullseye | (not affected) | |||
oath-toolkit | source | bookworm | 2.6.7-3.1+deb12u1 | DSA-5784-1 | ||
oath-toolkit | source | (unstable) | 2.6.12-1 |
[bullseye] - oath-toolkit <not-affected> (Vulnerable code not present)
https://www.openwall.com/lists/oss-security/2024/10/04/2
https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html
https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191/
Introduced with: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/60d9902b5c20f27e70f8e9c816bfdc0467567e1a (oath-toolkit-2.6.7)
Fixed by: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3235a52f6b87cd1c5da6508f421ac261f5e33a70 (oath-toolkit-2.6.12)
Fixed by: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3271139989fde35ab0163b558fc29e80c3a280e5 (oath-toolkit-2.6.12)
Fixed by: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/95ef255e6a401949ce3f67609bf8aac2029db418 (oath-toolkit-2.6.12)