Описание
pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.6.12-1 |
| esm-apps/bionic | not-affected | code not present |
| esm-apps/xenial | not-affected | code not present |
| esm-infra/focal | not-affected | code not present |
| focal | not-affected | code not present |
| jammy | released | 2.6.7-3ubuntu0.1 |
| noble | released | 2.6.11-2.1ubuntu0.1 |
| oracular | released | 2.6.11-3ubuntu1 |
| plucky | needed | |
| questing | needed |
Показывать по
EPSS
7.1 High
CVSS3
Связанные уязвимости
pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows ...
pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
EPSS
7.1 High
CVSS3