drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in pam_pkcs11
| Name: |
Zwei Probleme in pam_pkcs11 |
|
| ID: |
SUSE-SU-2025:0712-1 |
|
| Distribution: |
SUSE |
|
| Plattformen: |
SUSE Linux Enterprise Micro 5.1, SUSE Linux Enterprise Micro 5.2, SUSE Linux Enterprise Micro 5.3, SUSE Linux Enterprise Micro for Rancher 5.3, SUSE Linux Enterprise Micro for Rancher 5.2, SUSE Linux Enterprise Micro 5.4, SUSE Linux Enterprise Micro for Rancher 5.4, SUSE Linux Enterprise Micro 5.5 |
|
| Datum: |
Di, 25. Februar 2025, 23:01 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2025-24032
https://www.cve.org/CVERecord?id=CVE-2025-24031 |
|
| Applikationen: |
pam_pkcs11 |
|
Originalnachricht |
--===============5186940514417972749== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for pam_pkcs11
Announcement ID: SUSE-SU-2025:0712-1 Release Date: 2025-02-25T10:38:13Z Rating: moderate References:
* bsc#1237058 * bsc#1237062
Cross-References:
* CVE-2025-24031 * CVE-2025-24032
CVSS scores:
* CVE-2025-24031 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24031 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-24032 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-24032 ( SUSE ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L * CVE-2025-24032 ( NVD ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for pam_pkcs11 fixes the following issues:
* CVE-2025-24032: default value for `cert_policy` (`none`) allows for authentication bypass (bsc#1237062). * CVE-2025-24031: uninitialized pointer dereference caused by user pressing ctrl-c/ctrl-d when asked for PIN leads to crash (bsc#1237058).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-712=1
* SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-712=1
* SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-712=1
* SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-712=1
* SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-712=1
* SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-712=1
* SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-712=1
* SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-712=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.6.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.6.1 * pam_pkcs11-0.6.10-150100.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2025-24031.html * https://www.suse.com/security/cve/CVE-2025-24032.html * https://bugzilla.suse.com/show_bug.cgi?id=1237058 * https://bugzilla.suse.com/show_bug.cgi?id=1237062
--===============5186940514417972749== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for pam_pkcs11</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2025:0712-1</td> </tr> <tr> <th>Release Date:</th> <td>2025-02-25T10:38:13Z</td> </tr> <tr> <th>Rating:</th> <td>moderate</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237058">bsc#1237058</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237062">bsc#1237062</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-24031.html">CVE-2025-24031</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-24032.html">CVE-2025-24032</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-24031</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.6</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-24031</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-24031</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-24032</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-24032</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-24032</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">9.2</span> <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li> <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.2</li> <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li> <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves two vulnerabilities can now be installed.</p>
<h2>Description:</h2> <p>This update for pam_pkcs11 fixes the following issues:</p> <ul> <li>CVE-2025-24032: default value for <code>cert_policy</code> (<code>none</code>) allows for authentication bypass (bsc#1237062).</li> <li>CVE-2025-24031: uninitialized pointer dereference caused by user pressing ctrl-c/ctrl-d when asked for PIN leads to crash (bsc#1237058).</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise Micro for Rancher 5.3 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.3-2025-712=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.3 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.3-2025-712=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro for Rancher 5.4 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.4-2025-712=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.4 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.4-2025-712=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.5 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.5-2025-712=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.1 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-712=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.2 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-712=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro for Rancher 5.2 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-712=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) <ul> <li>pam_pkcs11-debugsource-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-debuginfo-0.6.10-150100.3.6.1</li> <li>pam_pkcs11-0.6.10-150100.3.6.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2025-24031.html">https://www.suse.com/security/cve/CVE-2025-24031.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-24032.html">https://www.suse.com/security/cve/CVE-2025-24032.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237058">https://bugzilla.suse.com/show_bug.cgi?id=1237058</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237062">https://bugzilla.suse.com/show_bug.cgi?id=1237062</a> </li> </ul> </div>
--===============5186940514417972749==--
|
|
|
|