CVE-2024-47191
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
09/10/2024
Last modified:
10/10/2024
Description
pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3235a52f6b87cd1c5da6508f421ac261f5e33a70
- https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3271139989fde35ab0163b558fc29e80c3a280e5
- https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/60d9902b5c20f27e70f8e9c816bfdc0467567e1a
- https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/95ef255e6a401949ce3f67609bf8aac2029db418
- https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/43
- https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html
- https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191
- https://www.openwall.com/lists/oss-security/2024/10/04/2



