First published: Thu Mar 20 2025(Updated: )
Marcus Rückert and Matthias Gerstner discovered that PAM-PKCS#11 did not properly handle certain return codes when authentication was not possible. An attacker could possibly use this issue to bypass authentication. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-24531) It was discovered that PAM-PKCS#11 did not require a private key signature for authentication by default. An attacker could possibly use this issue to bypass authentication. (CVE-2025-24032)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpam-pkcs11 | <0.6.12-2ubuntu0.24.10.1 | 0.6.12-2ubuntu0.24.10.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/libpam-pkcs11 | <0.6.12-2ubuntu0.24.04.1 | 0.6.12-2ubuntu0.24.04.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libpam-pkcs11 | <0.6.11-4ubuntu0.1 | 0.6.11-4ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libpam-pkcs11 | <0.6.11-2ubuntu0.1 | 0.6.11-2ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libpam-pkcs11 | <0.6.9-2ubuntu0.1~esm1 | 0.6.9-2ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libpam-pkcs11 | <0.6.8-4ubuntu0.1~esm1 | 0.6.8-4ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7363-1 is considered high due to the potential for attackers to bypass authentication.
To fix USN-7363-1, you should update the libpam-pkcs11 package to the latest version provided by Ubuntu for your distribution.
USN-7363-1 affects Ubuntu 24.04 LTS, 24.10, 22.04, 20.04, 18.04, and 16.04 LTS.
You can mitigate USN-7363-1 by applying any available security updates and reviewing your authentication mechanisms.
While the best practice is to update, temporarily restricting access to systems using libpam-pkcs11 may serve as a workaround.