Arch Linux Security Advisory ASA-202410-1 ========================================= Severity: High Date : 2024-10-04 CVE-ID : CVE-2024-47191 Package : oath-toolkit Type : privilege escalation Remote : No Link : https://security.archlinux.org/AVG-2857 Summary ======= The package oath-toolkit before version 2.6.12-1 is vulnerable to privilege escalation. Resolution ========== Upgrade to 2.6.12-1. # pacman -Syu "oath-toolkit>=2.6.12-1" The problem has been fixed upstream in version 2.6.12. Workaround ========== None. Description =========== Fabian Vogt reported that the PAM module in oath-toolkit, a collection of components to build one-time password authentication systems, does not safely perform file operations in users's home directories when using the usersfile feature (allowing to place the OTP state in the home directory of the to-be-authenticated user). A local user can take advantage of this flaw for root privilege escalation. Impact ====== A local unprivileged user is able to escalate privileges on the affected host. References ========== https://www.openwall.com/lists/oss-security/2024/10/04/2 https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191/ https://security.archlinux.org/CVE-2024-47191
participants (1)
-
Levente Polyak