From anthraxx at archlinux.org Sun Oct 6 23:27:27 2024 From: anthraxx at archlinux.org (Levente Polyak) Date: Sun, 6 Oct 2024 23:27:27 +0200 Subject: [manjaro-security] [ASA-202410-1] oath-toolkit: privilege escalation Message-ID: Arch Linux Security Advisory ASA-202410-1 ========================================= Severity: High Date : 2024-10-04 CVE-ID : CVE-2024-47191 Package : oath-toolkit Type : privilege escalation Remote : No Link : https://security.archlinux.org/AVG-2857 Summary ======= The package oath-toolkit before version 2.6.12-1 is vulnerable to privilege escalation. Resolution ========== Upgrade to 2.6.12-1. # pacman -Syu "oath-toolkit>=2.6.12-1" The problem has been fixed upstream in version 2.6.12. Workaround ========== None. Description =========== Fabian Vogt reported that the PAM module in oath-toolkit, a collection of components to build one-time password authentication systems, does not safely perform file operations in users's home directories when using the usersfile feature (allowing to place the OTP state in the home directory of the to-be-authenticated user). A local user can take advantage of this flaw for root privilege escalation. Impact ====== A local unprivileged user is able to escalate privileges on the affected host. References ========== https://www.openwall.com/lists/oss-security/2024/10/04/2 https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191/ https://security.archlinux.org/CVE-2024-47191 -------------- next part -------------- A non-text attachment was scrubbed... Name: OpenPGP_signature.asc Type: application/pgp-signature Size: 833 bytes Desc: OpenPGP digital signature URL: