CVE-2008-1946

Source
https://nvd.nist.gov/vuln/detail/CVE-2008-1946
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2008-1946.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2008-1946
Downstream
Published
2008-07-28T17:41:00Z
Modified
2025-08-09T19:01:28Z
Summary
[none]
Details

The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pamsucceedif.so module.

References

Affected packages