CVE-2024-47191
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th
pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
| Vendor | n/a |
| Product | n/a |
| Published | Oct 9, 2024 |
| Last Updated | Oct 18, 2024 |
Stay Ahead of the Next One
Get instant alerts for n/a n/a
Be the first to know when new high vulnerabilities affecting n/a n/a are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
n/a / n/a
n/a
References
gitlab.com: https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/43 openwall.com: https://www.openwall.com/lists/oss-security/2024/10/04/2 security.opensuse.org: https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html nongnu.org: https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191 gitlab.com: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/60d9902b5c20f27e70f8e9c816bfdc0467567e1a gitlab.com: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3235a52f6b87cd1c5da6508f421ac261f5e33a70 gitlab.com: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3271139989fde35ab0163b558fc29e80c3a280e5 gitlab.com: https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/95ef255e6a401949ce3f67609bf8aac2029db418 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/04/2 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/05/1 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/08/1 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/08/2 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/08/4 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/15/7 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/17/1 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/18/1 openwall.com: http://www.openwall.com/lists/oss-security/2024/10/18/2