Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Nov 2020 21:43:38 +0300
From: "Dmitry V. Levin" <ldv@...linux.org>
To: oss-security@...ts.openwall.com
Subject: Re: Heads up: PAM 1.5.0 has a auth bypass under some
 conditions

Hi,

On Tue, Nov 24, 2020 at 07:20:21PM +0100, Marcus Meissner wrote:
> Hi,
> 
> (via IRC, spotted by Foxboron)
> 
> PAM 1.5.0 had a potential auth bypass, if a user did not exist and the root password was
> empty (but root locked down).
> 
> The reporters usecase was spammers pretending to be unknown users with a PAM enabled dovecot.
> 
> This issue affected only pam 1.5.0.

I'd like to note that the issue affects pam_unix module only,
those who use other authentication modules instead of pam_unix
are not effected.

Nevertheless, Linux-PAM 1.5.1 is going to be released shortly
to address this issue.

Just for the record, the bug was introduced by commit
https://github.com/linux-pam/linux-pam/commit/af0faf666c5008e54dfe43684f210e3581ff1bca
and fixed by commit
https://github.com/linux-pam/linux-pam/commit/30fdfb90d9864bcc254a62760aaa149d373fd4eb


-- 
ldv

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.