diff options
author | GLSAMaker <glsamaker@gentoo.org> | 2024-12-07 11:29:36 +0000 |
---|---|---|
committer | Hans de Graaff <graaff@gentoo.org> | 2024-12-07 12:29:51 +0100 |
commit | d68b435cf0bf62e307cf4887a99866274a0677d7 (patch) | |
tree | 8e027a76274f8365cb76c525d3df0a7fa0320c8d | |
parent | [ GLSA 202412-10 ] Dnsmasq: Multiple Vulnerabilities (diff) | |
download | gentoo-d68b435cf0bf62e307cf4887a99866274a0677d7.tar.gz gentoo-d68b435cf0bf62e307cf4887a99866274a0677d7.tar.bz2 gentoo-d68b435cf0bf62e307cf4887a99866274a0677d7.zip |
[ GLSA 202412-11 ] OATH Toolkit: Privilege Escalation
Bug: https://bugs.gentoo.org/940778
Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
Signed-off-by: Hans de Graaff <graaff@gentoo.org>
-rw-r--r-- | glsa-202412-11.xml | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/glsa-202412-11.xml b/glsa-202412-11.xml new file mode 100644 index 000000000000..8596c449aadb --- /dev/null +++ b/glsa-202412-11.xml @@ -0,0 +1,42 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202412-11"> + <title>OATH Toolkit: Privilege Escalation</title> + <synopsis>A vulnerability has been discovered in OATH Toolkit, which could lead to local root privilege escalation.</synopsis> + <product type="ebuild">oath-toolkit</product> + <announced>2024-12-07</announced> + <revised count="1">2024-12-07</revised> + <bug>940778</bug> + <access>local</access> + <affected> + <package name="sys-auth/oath-toolkit" auto="yes" arch="*"> + <unaffected range="ge">2.6.12</unaffected> + <vulnerable range="lt">2.6.12</vulnerable> + </package> + </affected> + <background> + <p>OATH Toolkit provide components to build one-time password authentication systems. It contains shared C libraries, command line tools and a PAM module. Supported technologies include the event-based HOTP algorithm (RFC 4226), the time-based TOTP algorithm (RFC 6238), and Portable Symmetric Key Container (PSKC, RFC 6030) to manage secret key data. OATH stands for Open AuTHentication, which is the organization that specify the algorithms.</p> + </background> + <description> + <p>A vulnerability has been discovered in OATH Toolkit. Please review the CVE identifier referenced below for details.</p> + </description> + <impact type="high"> + <p>Please review the referenced CVE identifier for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All OATH Toolkit users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-auth/oath-toolkit-2.6.12" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-47191">CVE-2024-47191</uri> + </references> + <metadata tag="requester" timestamp="2024-12-07T11:29:36.174751Z">graaff</metadata> + <metadata tag="submitter" timestamp="2024-12-07T11:29:36.177979Z">graaff</metadata> +</glsa>
\ No newline at end of file |