49 lines
1.6 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-47191",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T05:15:13.420",
"lastModified": "2024-10-09T05:15:13.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3235a52f6b87cd1c5da6508f421ac261f5e33a70",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3271139989fde35ab0163b558fc29e80c3a280e5",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/60d9902b5c20f27e70f8e9c816bfdc0467567e1a",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/95ef255e6a401949ce3f67609bf8aac2029db418",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/43",
"source": "cve@mitre.org"
},
{
"url": "https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/10/04/2",
"source": "cve@mitre.org"
}
]
}