CVE-2024-9312

Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:authd:*:*:*:*:*:*:*:*

History

26 Aug 2025, 17:43

Type Values Removed Values Added
References () https://github.com/ubuntu/authd/security/advisories/GHSA-4gfw-wf7c-w6g2 - () https://github.com/ubuntu/authd/security/advisories/GHSA-4gfw-wf7c-w6g2 - Exploit, Mitigation, Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2024-9312 - () https://www.cve.org/CVERecord?id=CVE-2024-9312 - Third Party Advisory
CWE CWE-335
CPE cpe:2.3:a:canonical:authd:*:*:*:*:*:*:*:*
First Time Canonical
Canonical authd

Information

Published : 2024-10-10 14:15

Updated : 2025-08-26 17:43


NVD link : CVE-2024-9312

Mitre link : CVE-2024-9312

CVE.ORG link : CVE-2024-9312


JSON object : View

Products Affected

canonical

  • authd
CWE
CWE-286

Incorrect User Management

CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)