Arch Linux 793 Published by

The Oath-Toolkit security update for ArchLinux addresses a vulnerability in the PAM module that allows root privilege escalation. Fabian Vogt discovered that the PAM module in oath-toolkit does not reliably conduct file operations in users' home directories, and reported the problem.

[ASA-202410-1] oath-toolkit: privilege escalation




[ASA-202410-1] oath-toolkit: privilege escalation


Arch Linux Security Advisory ASA-202410-1
=========================================

Severity: High
Date : 2024-10-04
CVE-ID : CVE-2024-47191
Package : oath-toolkit
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-2857

Summary
=======

The package oath-toolkit before version 2.6.12-1 is vulnerable to
privilege escalation.

Resolution
==========

Upgrade to 2.6.12-1.

# pacman -Syu "oath-toolkit&rt;=2.6.12-1"

The problem has been fixed upstream in version 2.6.12.

Workaround
==========

None.

Description
===========

Fabian Vogt reported that the PAM module in oath-toolkit, a collection
of components to build one-time password authentication systems, does
not safely perform file operations in users's home directories when
using the usersfile feature (allowing to place the OTP state in the
home directory of the to-be-authenticated user). A local user can take
advantage of this flaw for root privilege escalation.

Impact
======

A local unprivileged user is able to escalate privileges on the
affected host.

References
==========

https://www.openwall.com/lists/oss-security/2024/10/04/2
https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html
https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191/
https://security.archlinux.org/CVE-2024-47191