CVE-2024-47191 log

Source
Severity High
Remote No
Type Privilege escalation
Description
Fabian Vogt reported that the PAM module in oath-toolkit, a collection of components to build one-time password authentication systems, does not safely perform file operations in  users's home directories when using the usersfile feature (allowing to place the OTP state in the home directory of the to-be-authenticated user). A local user can take advantage of this flaw for root privilege escalation.
Group Package Affected Fixed Severity Status Ticket
AVG-2857 oath-toolkit 2.6.11-1 2.6.12-1 High Fixed
References
https://www.openwall.com/lists/oss-security/2024/10/04/2
https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html
https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191/
Notes
Introduced with: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/60d9902b5c20f27e70f8e9c816bfdc0467567e1a (oath-toolkit-2.6.7)
Fixed by: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3235a52f6b87cd1c5da6508f421ac261f5e33a70 (oath-toolkit-2.6.12)
Fixed by: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3271139989fde35ab0163b558fc29e80c3a280e5 (oath-toolkit-2.6.12)
Fixed by: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/95ef255e6a401949ce3f67609bf8aac2029db418 (oath-toolkit-2.6.12)