First published: Mon Sep 21 2020(Updated: )
It was discovered that pam_tacplus did not properly manage shared secrets if DEBUG loglevel and journald are used. A remote attacker could use this issue to expose sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpam-tacplus | <1.3.8-2+deb8u1build0.20.04.1 | 1.3.8-2+deb8u1build0.20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/libpam-tacplus | <1.3.8-2+deb8u1build0.18.04.1 | 1.3.8-2+deb8u1build0.18.04.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libpam-tacplus | <1.3.8-2+deb8u1build0.16.04.1 | 1.3.8-2+deb8u1build0.16.04.1 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is USN-4521-1.
The title of the vulnerability is 'USN-4521-1: pam_tacplus vulnerability'.
The vulnerability is related to pam_tacplus not properly managing shared secrets if DEBUG loglevel and journald are used, which can allow a remote attacker to expose sensitive information.
The following versions of libpam-tacplus are affected: 1.3.8-2+deb8u1build0.20.04.1 (Ubuntu 20.04), 1.3.8-2+deb8u1build0.18.04.1 (Ubuntu 18.04), and 1.3.8-2+deb8u1build0.16.04.1 (Ubuntu 16.04).
To fix this vulnerability, it is recommended to install the appropriate updates for libpam-tacplus. Please refer to the references for more information on the updates.