CVE-2024-9312

Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:authd:*:*:*:*:*:*:*:*

History

26 Aug 2025, 17:43

Type Values Removed Values Added
CWE CWE-335
First Time Canonical
Canonical authd
References () https://github.com/ubuntu/authd/security/advisories/GHSA-4gfw-wf7c-w6g2 - () https://github.com/ubuntu/authd/security/advisories/GHSA-4gfw-wf7c-w6g2 - Exploit, Mitigation, Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2024-9312 - () https://www.cve.org/CVERecord?id=CVE-2024-9312 - Third Party Advisory
CPE cpe:2.3:a:canonical:authd:*:*:*:*:*:*:*:*

15 Oct 2024, 12:58

Type Values Removed Values Added
Summary
  • (es) Authd, hasta la versión 0.3.6, no aleatorizaba lo suficiente los identificadores de usuario para evitar colisiones. Un atacante local que pudiera registrar nombres de usuario podría falsificar el identificador de otro usuario y obtener sus privilegios.

10 Oct 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-10 14:15

Updated : 2025-08-26 17:43


NVD link : CVE-2024-9312

Mitre link : CVE-2024-9312

CVE.ORG link : CVE-2024-9312


JSON object : View

Products Affected

canonical

  • authd
CWE
CWE-286

Incorrect User Management

CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)