Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 24 Nov 2020 15:41:38 -0300
From: Érico Nogueira <ericonr@...root.org>
To: <oss-security@...ts.openwall.com>
Subject: Re: Heads up: PAM 1.5.0 has a auth bypass under some
 conditions

On Tue Nov 24, 2020 at 3:02 PM -03, John Helmert III wrote:
> On Tue, Nov 24, 2020 at 07:20:21PM +0100, Marcus Meissner wrote:
> > Hi,
> > 
> > (via IRC, spotted by Foxboron)
> > 
> > PAM 1.5.0 had a potential auth bypass, if a user did not exist and the root password was
> > empty (but root locked down).
> > 
> > The reporters usecase was spammers pretending to be unknown users with a PAM enabled dovecot.
> > 
> > This issue affected only pam 1.5.0.
> > 
> > News entry:
> > https://github.com/linux-pam/linux-pam/commit/28b8c7045ac8ea4ea080bce02a2df9e3b9e98f06
> > 
> > CVE-2020-27780
> > 
> > github issue reporting the problem: https://github.com/linux-pam/linux-pam/issues/284
> > Fixing commit: https://github.com/linux-pam/linux-pam/commit/af0faf666c5008e54dfe43684f210e3581ff1bca
>
> It looks like that commit is in 1.5.0, and the issue was closed by
> commit 30fdfb9 (not af0faf6).

>From the PR [1] that fixed it, the issue was introduced in af0faf6.

Commit 30fdfb9 was made 4 days ago, and is not in the 1.5.0 release
(clearing this up for others, since I thought you meant the issue had
been solved in 1.5.0 already, and was a bit confused).

- [1] https://github.com/linux-pam/linux-pam/pull/300

Cheers,
Érico

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.