|
|
Subscribe / Log in / New account

oath-toolkit: privilege escalation in pam_oath.so (SUSE Security Team Blog)

The SUSE Security Team Blog has a detailed report on its discovery of a privilege escalation in the oath-toolkit, which provides libraries and utilities for managing one-time password (OTP) authentication.

Fellow SUSE engineer Fabian Vogt approached our Security Team about the project's PAM module. A couple of years ago, the module gained a feature which allows to place the OTP state file (called usersfile) in the home directory of the to-be-authenticated user. Fabian noticed that the PAM module performs unsafe file operations in users' home directories. Since PAM stacks typically run as root, this can easily cause security issues.



to post comments

specific-os enhancements

Posted Oct 5, 2024 18:09 UTC (Sat) by hmh (subscriber, #3838) [Link]

Given the security-sensitive nature of pam modules, it seems like adding o.s-speciifc enhancements would bring more value than the extra maintenance cost.

I wonder if the other Linux distros will pick up the suse enhancements on top of the more portable upstream patch...


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds