[ASA-202410-1] oath-toolkit: privilege escalation
[ASA-202410-1] oath-toolkit: privilege escalation
Arch Linux Security Advisory ASA-202410-1
=========================================
Severity: High
Date : 2024-10-04
CVE-ID : CVE-2024-47191
Package : oath-toolkit
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-2857
Summary
=======
The package oath-toolkit before version 2.6.12-1 is vulnerable to
privilege escalation.
Resolution
==========
Upgrade to 2.6.12-1.
# pacman -Syu "oath-toolkit&rt;=2.6.12-1"
The problem has been fixed upstream in version 2.6.12.
Workaround
==========
None.
Description
===========
Fabian Vogt reported that the PAM module in oath-toolkit, a collection
of components to build one-time password authentication systems, does
not safely perform file operations in users's home directories when
using the usersfile feature (allowing to place the OTP state in the
home directory of the to-be-authenticated user). A local user can take
advantage of this flaw for root privilege escalation.
Impact
======
A local unprivileged user is able to escalate privileges on the
affected host.
References
==========
https://www.openwall.com/lists/oss-security/2024/10/04/2
https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html
https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191/
https://security.archlinux.org/CVE-2024-47191