Name | CVE-2020-27743 |
Description | libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libpam-tacplus (PTS) | jessie, jessie (lts) | 1.3.8-2+deb8u1 | fixed |
| stretch (security), stretch (lts), stretch | 1.3.8-2+deb9u1 | fixed |
| buster, buster (lts) | 1.3.8-2+deb10u2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libpam-tacplus | source | (unstable) | (not affected) | | | |
Notes
- libpam-tacplus <not-affected> (Vulnerable code added later)
https://github.com/kravietz/pam_tacplus/pull/163
https://github.com/kravietz/pam_tacplus/security/advisories/GHSA-rp3p-jm35-jv76
Introduced with: https://github.com/kravietz/pam_tacplus/commit/6fac2504657b8d98fcd627d60ebdbffcf0253b81 (v1.5.0-beta.1)
Fixed by: https://github.com/kravietz/pam_tacplus/commit/c9bed7496e81e550ee22746f23bbb11be2e046ed (v1.6.1)
Fixed by: https://github.com/kravietz/pam_tacplus/commit/bceaab0cd51a09b88f40f19da799ac7390264bf8 (v1.6.1)