Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202012-06 ] Linux-PAM: Authentication bypass
Date: Mon, 07 Dec 2020 00:43:12
Message-Id: 702ae42c-3226-d4b1-a2e9-140e515b591b@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202012-06
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Linux-PAM: Authentication bypass
9 Date: December 07, 2020
10 Bugs: #756361
11 ID: 202012-06
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been found in Linux-PAM, allowing attackers to
19 bypass the authentication process.
20
21 Background
22 ==========
23
24 Linux-PAM (Pluggable Authentication Modules) is an architecture
25 allowing the separation of the development of privilege granting
26 software from the development of secure and appropriate authentication
27 schemes.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 sys-libs/pam < 1.5.1 >= 1.5.1
36
37 Description
38 ===========
39
40 A flaw was found in Linux-Pam in the way it handle empty passwords for
41 non-existing users.
42
43 Impact
44 ======
45
46 A remote attacker, who only needs to know a non-existing username,
47 could bypass security restrictions and authenticate as root user.
48
49 Workaround
50 ==========
51
52 Ensure that root account is protected by a non-empty password.
53
54 Resolution
55 ==========
56
57 All Linux-PAM users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=sys-libs/pam-1.5.1"
61
62 References
63 ==========
64
65 [ 1 ] CVE-2020-27780
66 https://nvd.nist.gov/vuln/detail/CVE-2020-27780
67
68 Availability
69 ============
70
71 This GLSA and any updates to it are available for viewing at
72 the Gentoo Security Website:
73
74 https://security.gentoo.org/glsa/202012-06
75
76 Concerns?
77 =========
78
79 Security is a primary focus of Gentoo Linux and ensuring the
80 confidentiality and security of our users' machines is of utmost
81 importance to us. Any security concerns should be addressed to
82 security@g.o or alternatively, you may file a bug at
83 https://bugs.gentoo.org.
84
85 License
86 =======
87
88 Copyright 2020 Gentoo Foundation, Inc; referenced text
89 belongs to its owner(s).
90
91 The contents of this document are licensed under the
92 Creative Commons - Attribution / Share Alike license.
93
94 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
OpenPGP_signature.asc application/pgp-signature