Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 231448 - CVE-2006-7108 login omits pam_acct_mgmt & pam_chauthtok when authentication is skipped.
Summary: CVE-2006-7108 login omits pam_acct_mgmt & pam_chauthtok when authentication i...
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: util-linux
Version: 3.0
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Karel Zak
QA Contact: Ben Levenson
Whiteboard: source=bugzilla,reported=20060109,pub...
Depends On:
TreeView+ depends on / blocked
Reported: 2007-03-08 13:19 UTC by Mark J. Cox
Modified: 2007-11-30 22:07 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2007-09-07 19:39:03 UTC
Target Upstream Version:

Attachments (Terms of Use)

Description Mark J. Cox 2007-03-08 13:19:03 UTC
+++ This bug was initially created as a clone of Bug #177331 +++

Description of problem:
login omits pam_acct_mgmt & chauth_tok when authentication is skipped.
Authentication may be skipped, for example, during krlogin because Kerberos
already took care of it. The problem with skipping pam_acct_mgmt is that it
allows users to use the system when maybe they should not be allowed, such that
if they have a Kerberos ticket, the other checks do not apply.

If a user had to use password authentication, pam_acct_mgmt may reject the user
for several reasons: not allowed to use the system at this time, not allowed to
use this system, user's account has been disabled, etc. Why should these tests
be skipped just because the user has a ticket?

Same with pam_chauthtok: the user may have a valid ticket, but if their password
has expired, they need to enter a new one right now.

-- Additional comment from on 2007-03-08 08:11 EST --
Note was assigned CVE-2006-7108

Comment 1 Josh Bressers 2007-09-07 19:39:03 UTC
This flaw has been rated as having a low severity by the Red Hat Security
Response Team.  More information about this rating can be found here:

The risks associated with fixing this bug are greater than the low severity
security risk. We therefore currently have no plans to fix this flaw in Red
Hat Enterprise Linux 3 which is in maintenance mode.

If you believe this judgement to be in error, please reopen this bug with an
appropriate comment.

Note You need to log in before you can comment on or make changes to this bug.