CVE-2020-27743

NameCVE-2020-27743
Descriptionlibtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libpam-tacplus (PTS)jessie, jessie (lts)1.3.8-2+deb8u1fixed
stretch (security), stretch (lts), stretch1.3.8-2+deb9u1fixed
buster, buster (lts)1.3.8-2+deb10u2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libpam-tacplussource(unstable)(not affected)

Notes

- libpam-tacplus <not-affected> (Vulnerable code added later)
https://github.com/kravietz/pam_tacplus/pull/163
https://github.com/kravietz/pam_tacplus/security/advisories/GHSA-rp3p-jm35-jv76
Introduced with: https://github.com/kravietz/pam_tacplus/commit/6fac2504657b8d98fcd627d60ebdbffcf0253b81 (v1.5.0-beta.1)
Fixed by: https://github.com/kravietz/pam_tacplus/commit/c9bed7496e81e550ee22746f23bbb11be2e046ed (v1.6.1)
Fixed by: https://github.com/kravietz/pam_tacplus/commit/bceaab0cd51a09b88f40f19da799ac7390264bf8 (v1.6.1)

Search for package or bug name: Reporting problems