Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-23013 (GCVE-0-2025-23013)
Vulnerability from cvelistv5
Published
2025-01-15 00:00
Modified
2025-02-03 10:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-394 - Unexpected Status Code or Return Value
Summary
In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-02-03T10:03:09.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/01/15/1" }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/16/2" }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/16/3" }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/16/4" }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/16/5" }, { "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00001.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2025-23013", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T14:51:01.272240Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-15T14:51:14.757Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "pam-u2f", "vendor": "Yubico", "versions": [ { "lessThan": "1.3.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yubico:pam-u2f:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password." } ], "metrics": [ { "cvssV4_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-394", "description": "CWE-394 Unexpected Status Code or Return Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T03:56:38.534Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.yubico.com/support/security-advisories/ysa-2025-01/" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-23013", "datePublished": "2025-01-15T00:00:00.000Z", "dateReserved": "2025-01-09T00:00:00.000Z", "dateUpdated": "2025-02-03T10:03:09.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-23013\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-01-15T04:15:20.037\",\"lastModified\":\"2025-02-03T10:15:09.250\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.\"},{\"lang\":\"es\",\"value\":\"En Yubico pam-u2f anterior a la versi\u00f3n 1.3.1, a veces puede producirse una escalada de privilegios locales. Este producto implementa un m\u00f3dulo de autenticaci\u00f3n conectable (PAM) que se puede implementar para admitir la autenticaci\u00f3n mediante una YubiKey u otros autenticadores compatibles con FIDO en macOS o Linux. Este paquete de software tiene un problema que permite omitir la autenticaci\u00f3n en algunas configuraciones. Un atacante necesitar\u00eda poder acceder al sistema como un usuario sin privilegios. Seg\u00fan la configuraci\u00f3n, el atacante tambi\u00e9n podr\u00eda necesitar saber la contrase\u00f1a del usuario.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-394\"}]}],\"references\":[{\"url\":\"https://www.yubico.com/support/security-advisories/ysa-2025-01/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/01/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/01/16/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/01/16/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/01/16/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/01/16/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/02/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/01/15/1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/01/16/2\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/01/16/3\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/01/16/4\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/01/16/5\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/02/msg00001.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-02-03T10:03:09.695Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-23013\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-15T14:51:01.272240Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-15T14:51:05.467Z\"}}], \"cna\": {\"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\"}}], \"affected\": [{\"vendor\": \"Yubico\", \"product\": \"pam-u2f\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.3.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.yubico.com/support/security-advisories/ysa-2025-01/\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-394\", \"description\": \"CWE-394 Unexpected Status Code or Return Value\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:yubico:pam-u2f:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"1.3.1\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-01-15T03:56:38.534Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-23013\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-03T10:03:09.695Z\", \"dateReserved\": \"2025-01-09T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-01-15T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
suse-su-2025:20132-1
Vulnerability from csaf_suse
Published
2025-03-04 08:28
Modified
2025-03-04 08:28
Summary
Security update for pam_u2f
Notes
Title of the patch
Security update for pam_u2f
Description of the patch
This update for pam_u2f fixes the following issues:
- update to 1.3.2:
* Relax authfile permission check to a warning instead of an error to prevent
a breaking change locking existing users out of their systems.
- update to 1.3.1:
* CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517).
* Changed return value when nouserok is enabled and the user has no
credentials, PAM_IGNORE is used instead of PAM_SUCCESS.
* Hardened checks of authfile permissions.
* Hardened checks for nouserok.
* Improved debug messages.
* Improved documentation.
Patchnames
SUSE-SLE-Micro-6.0-221
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pam_u2f", "title": "Title of the patch" }, { "category": "description", "text": "This update for pam_u2f fixes the following issues:\n\n- update to 1.3.2:\n * Relax authfile permission check to a warning instead of an error to prevent\n a breaking change locking existing users out of their systems. \n\n- update to 1.3.1:\n * CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517).\n * Changed return value when nouserok is enabled and the user has no\n credentials, PAM_IGNORE is used instead of PAM_SUCCESS.\n * Hardened checks of authfile permissions.\n * Hardened checks for nouserok.\n * Improved debug messages.\n * Improved documentation. \n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Micro-6.0-221", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20132-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:20132-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520132-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:20132-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021199.html" }, { "category": "self", "summary": "SUSE Bug 1233517", "url": "https://bugzilla.suse.com/1233517" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23013 page", "url": "https://www.suse.com/security/cve/CVE-2025-23013/" } ], "title": "Security update for pam_u2f", "tracking": { "current_release_date": "2025-03-04T08:28:37Z", "generator": { "date": "2025-03-04T08:28:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:20132-1", "initial_release_date": "2025-03-04T08:28:37Z", "revision_history": [ { "date": "2025-03-04T08:28:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.2-1.1.aarch64", "product": { "name": "pam_u2f-1.3.2-1.1.aarch64", "product_id": "pam_u2f-1.3.2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.2-1.1.s390x", "product": { "name": "pam_u2f-1.3.2-1.1.s390x", "product_id": "pam_u2f-1.3.2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.2-1.1.x86_64", "product": { "name": "pam_u2f-1.3.2-1.1.x86_64", "product_id": "pam_u2f-1.3.2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Micro 6.0", "product": { "name": "SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0", "product_identification_helper": { "cpe": "cpe:/o:suse:sl-micro:6.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.2-1.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.aarch64" }, "product_reference": "pam_u2f-1.3.2-1.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.2-1.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.s390x" }, "product_reference": "pam_u2f-1.3.2-1.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.2-1.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.x86_64" }, "product_reference": "pam_u2f-1.3.2-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23013" } ], "notes": [ { "category": "general", "text": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.aarch64", "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.s390x", "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23013", "url": "https://www.suse.com/security/cve/CVE-2025-23013" }, { "category": "external", "summary": "SUSE Bug 1233517 for CVE-2025-23013", "url": "https://bugzilla.suse.com/1233517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.aarch64", "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.s390x", "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.aarch64", "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.s390x", "SUSE Linux Micro 6.0:pam_u2f-1.3.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-03-04T08:28:37Z", "details": "important" } ], "title": "CVE-2025-23013" } ] }
suse-su-2025:0167-1
Vulnerability from csaf_suse
Published
2025-01-17 16:09
Modified
2025-01-17 16:09
Summary
Security update for pam_u2f
Notes
Title of the patch
Security update for pam_u2f
Description of the patch
This update for pam_u2f fixes the following issues:
- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)
Patchnames
SUSE-2025-167,SUSE-SLE-Module-Basesystem-15-SP6-2025-167,openSUSE-SLE-15.6-2025-167
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pam_u2f", "title": "Title of the patch" }, { "category": "description", "text": "This update for pam_u2f fixes the following issues:\n\n- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-167,SUSE-SLE-Module-Basesystem-15-SP6-2025-167,openSUSE-SLE-15.6-2025-167", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0167-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0167-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250167-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0167-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020166.html" }, { "category": "self", "summary": "SUSE Bug 1233517", "url": "https://bugzilla.suse.com/1233517" }, { "category": "self", "summary": "SUSE Bug 1235961", "url": "https://bugzilla.suse.com/1235961" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23013 page", "url": "https://www.suse.com/security/cve/CVE-2025-23013/" } ], "title": "Security update for pam_u2f", "tracking": { "current_release_date": "2025-01-17T16:09:54Z", "generator": { "date": "2025-01-17T16:09:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0167-1", "initial_release_date": "2025-01-17T16:09:54Z", "revision_history": [ { "date": "2025-01-17T16:09:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150600.10.5.1.aarch64", "product": { "name": "pam_u2f-1.2.0-150600.10.5.1.aarch64", "product_id": "pam_u2f-1.2.0-150600.10.5.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150600.10.5.1.i586", "product": { "name": "pam_u2f-1.2.0-150600.10.5.1.i586", "product_id": "pam_u2f-1.2.0-150600.10.5.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150600.10.5.1.ppc64le", "product": { "name": "pam_u2f-1.2.0-150600.10.5.1.ppc64le", "product_id": "pam_u2f-1.2.0-150600.10.5.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150600.10.5.1.s390x", "product": { "name": "pam_u2f-1.2.0-150600.10.5.1.s390x", "product_id": "pam_u2f-1.2.0-150600.10.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150600.10.5.1.x86_64", "product": { "name": "pam_u2f-1.2.0-150600.10.5.1.x86_64", "product_id": "pam_u2f-1.2.0-150600.10.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150600.10.5.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150600.10.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23013" } ], "notes": [ { "category": "general", "text": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.x86_64", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.aarch64", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.ppc64le", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.s390x", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23013", "url": "https://www.suse.com/security/cve/CVE-2025-23013" }, { "category": "external", "summary": "SUSE Bug 1233517 for CVE-2025-23013", "url": "https://bugzilla.suse.com/1233517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.x86_64", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.aarch64", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.ppc64le", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.s390x", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:pam_u2f-1.2.0-150600.10.5.1.x86_64", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.aarch64", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.ppc64le", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.s390x", "openSUSE Leap 15.6:pam_u2f-1.2.0-150600.10.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-17T16:09:54Z", "details": "important" } ], "title": "CVE-2025-23013" } ] }
suse-su-2025:20231-1
Vulnerability from csaf_suse
Published
2025-03-05 14:55
Modified
2025-03-05 14:55
Summary
Security update for pam_u2f
Notes
Title of the patch
Security update for pam_u2f
Description of the patch
This update for pam_u2f fixes the following issues:
- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517).
Patchnames
SUSE-SLE-Micro-6.1-29
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pam_u2f", "title": "Title of the patch" }, { "category": "description", "text": "This update for pam_u2f fixes the following issues:\n\n- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Micro-6.1-29", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20231-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:20231-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520231-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:20231-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021092.html" }, { "category": "self", "summary": "SUSE Bug 1233517", "url": "https://bugzilla.suse.com/1233517" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23013 page", "url": "https://www.suse.com/security/cve/CVE-2025-23013/" } ], "title": "Security update for pam_u2f", "tracking": { "current_release_date": "2025-03-05T14:55:47Z", "generator": { "date": "2025-03-05T14:55:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:20231-1", "initial_release_date": "2025-03-05T14:55:47Z", "revision_history": [ { "date": "2025-03-05T14:55:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.0-slfo.1.1_2.1.aarch64", "product": { "name": "pam_u2f-1.3.0-slfo.1.1_2.1.aarch64", "product_id": "pam_u2f-1.3.0-slfo.1.1_2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.0-slfo.1.1_2.1.s390x", "product": { "name": "pam_u2f-1.3.0-slfo.1.1_2.1.s390x", "product_id": "pam_u2f-1.3.0-slfo.1.1_2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.0-slfo.1.1_2.1.x86_64", "product": { "name": "pam_u2f-1.3.0-slfo.1.1_2.1.x86_64", "product_id": "pam_u2f-1.3.0-slfo.1.1_2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Micro 6.1", "product": { "name": "SUSE Linux Micro 6.1", "product_id": "SUSE Linux Micro 6.1", "product_identification_helper": { "cpe": "cpe:/o:suse:sl-micro:6.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.0-slfo.1.1_2.1.aarch64 as component of SUSE Linux Micro 6.1", "product_id": "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.aarch64" }, "product_reference": "pam_u2f-1.3.0-slfo.1.1_2.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.1" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.0-slfo.1.1_2.1.s390x as component of SUSE Linux Micro 6.1", "product_id": "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.s390x" }, "product_reference": "pam_u2f-1.3.0-slfo.1.1_2.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.1" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.0-slfo.1.1_2.1.x86_64 as component of SUSE Linux Micro 6.1", "product_id": "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.x86_64" }, "product_reference": "pam_u2f-1.3.0-slfo.1.1_2.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23013" } ], "notes": [ { "category": "general", "text": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.aarch64", "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.s390x", "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23013", "url": "https://www.suse.com/security/cve/CVE-2025-23013" }, { "category": "external", "summary": "SUSE Bug 1233517 for CVE-2025-23013", "url": "https://bugzilla.suse.com/1233517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.aarch64", "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.s390x", "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.aarch64", "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.s390x", "SUSE Linux Micro 6.1:pam_u2f-1.3.0-slfo.1.1_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-03-05T14:55:47Z", "details": "important" } ], "title": "CVE-2025-23013" } ] }
suse-su-2025:0200-1
Vulnerability from csaf_suse
Published
2025-01-21 12:50
Modified
2025-01-21 12:50
Summary
Security update for pam_u2f
Notes
Title of the patch
Security update for pam_u2f
Description of the patch
This update for pam_u2f fixes the following issues:
- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)
Patchnames
SUSE-2025-200,SUSE-SLE-Micro-5.3-2025-200,SUSE-SLE-Micro-5.4-2025-200,SUSE-SLE-Micro-5.5-2025-200,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-200,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-200,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-200,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-200,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-200,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-200,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-200,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-200,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-200,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-200
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pam_u2f", "title": "Title of the patch" }, { "category": "description", "text": "This update for pam_u2f fixes the following issues:\n\n- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-200,SUSE-SLE-Micro-5.3-2025-200,SUSE-SLE-Micro-5.4-2025-200,SUSE-SLE-Micro-5.5-2025-200,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-200,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-200,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-200,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-200,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-200,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-200,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-200,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-200,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-200,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-200", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0200-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0200-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250200-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0200-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020186.html" }, { "category": "self", "summary": "SUSE Bug 1233517", "url": "https://bugzilla.suse.com/1233517" }, { "category": "self", "summary": "SUSE Bug 1235961", "url": "https://bugzilla.suse.com/1235961" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23013 page", "url": "https://www.suse.com/security/cve/CVE-2025-23013/" } ], "title": "Security update for pam_u2f", "tracking": { "current_release_date": "2025-01-21T12:50:26Z", "generator": { "date": "2025-01-21T12:50:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0200-1", "initial_release_date": "2025-01-21T12:50:26Z", "revision_history": [ { "date": "2025-01-21T12:50:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "product": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "product_id": "pam_u2f-1.2.0-150400.4.5.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150400.4.5.1.i586", "product": { "name": "pam_u2f-1.2.0-150400.4.5.1.i586", "product_id": "pam_u2f-1.2.0-150400.4.5.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "product": { "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "product_id": "pam_u2f-1.2.0-150400.4.5.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150400.4.5.1.s390x", "product": { "name": "pam_u2f-1.2.0-150400.4.5.1.s390x", "product_id": "pam_u2f-1.2.0-150400.4.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "product": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "product_id": "pam_u2f-1.2.0-150400.4.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.ppc64le" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.s390x" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.2.0-150400.4.5.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64" }, "product_reference": "pam_u2f-1.2.0-150400.4.5.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23013" } ], "notes": [ { "category": "general", "text": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Manager Proxy 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23013", "url": "https://www.suse.com/security/cve/CVE-2025-23013" }, { "category": "external", "summary": "SUSE Bug 1233517 for CVE-2025-23013", "url": "https://bugzilla.suse.com/1233517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Manager Proxy 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.3:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.4:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Micro 5.5:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Manager Proxy 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.ppc64le", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.s390x", "SUSE Manager Server 4.3:pam_u2f-1.2.0-150400.4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-21T12:50:26Z", "details": "important" } ], "title": "CVE-2025-23013" } ] }
suse-su-2025:0198-1
Vulnerability from csaf_suse
Published
2025-01-21 10:10
Modified
2025-01-21 10:10
Summary
Security update for pam_u2f
Notes
Title of the patch
Security update for pam_u2f
Description of the patch
This update for pam_u2f fixes the following issues:
- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)
Patchnames
SUSE-2025-198,SUSE-SLE-SERVER-12-SP5-LTSS-2025-198,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-198
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pam_u2f", "title": "Title of the patch" }, { "category": "description", "text": "This update for pam_u2f fixes the following issues:\n\n- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-198,SUSE-SLE-SERVER-12-SP5-LTSS-2025-198,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-198", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0198-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0198-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250198-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0198-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020178.html" }, { "category": "self", "summary": "SUSE Bug 1233517", "url": "https://bugzilla.suse.com/1233517" }, { "category": "self", "summary": "SUSE Bug 1235961", "url": "https://bugzilla.suse.com/1235961" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23013 page", "url": "https://www.suse.com/security/cve/CVE-2025-23013/" } ], "title": "Security update for pam_u2f", "tracking": { "current_release_date": "2025-01-21T10:10:10Z", "generator": { "date": "2025-01-21T10:10:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0198-1", "initial_release_date": "2025-01-21T10:10:10Z", "revision_history": [ { "date": "2025-01-21T10:10:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-3.6.1.aarch64", "product": { "name": "pam_u2f-1.0.8-3.6.1.aarch64", "product_id": "pam_u2f-1.0.8-3.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-3.6.1.i586", "product": { "name": "pam_u2f-1.0.8-3.6.1.i586", "product_id": "pam_u2f-1.0.8-3.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-3.6.1.ppc64le", "product": { "name": "pam_u2f-1.0.8-3.6.1.ppc64le", "product_id": "pam_u2f-1.0.8-3.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-3.6.1.s390", "product": { "name": "pam_u2f-1.0.8-3.6.1.s390", "product_id": "pam_u2f-1.0.8-3.6.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-3.6.1.s390x", "product": { "name": "pam_u2f-1.0.8-3.6.1.s390x", "product_id": "pam_u2f-1.0.8-3.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-3.6.1.x86_64", "product": { "name": "pam_u2f-1.0.8-3.6.1.x86_64", "product_id": "pam_u2f-1.0.8-3.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-3.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.aarch64" }, "product_reference": "pam_u2f-1.0.8-3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-3.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.ppc64le" }, "product_reference": "pam_u2f-1.0.8-3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-3.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.s390x" }, "product_reference": "pam_u2f-1.0.8-3.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.x86_64" }, "product_reference": "pam_u2f-1.0.8-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-3.6.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:pam_u2f-1.0.8-3.6.1.x86_64" }, "product_reference": "pam_u2f-1.0.8-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23013" } ], "notes": [ { "category": "general", "text": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:pam_u2f-1.0.8-3.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23013", "url": "https://www.suse.com/security/cve/CVE-2025-23013" }, { "category": "external", "summary": "SUSE Bug 1233517 for CVE-2025-23013", "url": "https://bugzilla.suse.com/1233517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:pam_u2f-1.0.8-3.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:pam_u2f-1.0.8-3.6.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:pam_u2f-1.0.8-3.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-21T10:10:10Z", "details": "important" } ], "title": "CVE-2025-23013" } ] }
suse-su-2025:0192-1
Vulnerability from csaf_suse
Published
2025-01-20 09:04
Modified
2025-01-20 09:04
Summary
Security update for pam_u2f
Notes
Title of the patch
Security update for pam_u2f
Description of the patch
This update for pam_u2f fixes the following issues:
- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)
Patchnames
SUSE-2025-192,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-192,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-192,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-192,SUSE-Storage-7.1-2025-192
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pam_u2f", "title": "Title of the patch" }, { "category": "description", "text": "This update for pam_u2f fixes the following issues:\n\n- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-192,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-192,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-192,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-192,SUSE-Storage-7.1-2025-192", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0192-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0192-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250192-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0192-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020176.html" }, { "category": "self", "summary": "SUSE Bug 1233517", "url": "https://bugzilla.suse.com/1233517" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23013 page", "url": "https://www.suse.com/security/cve/CVE-2025-23013/" } ], "title": "Security update for pam_u2f", "tracking": { "current_release_date": "2025-01-20T09:04:08Z", "generator": { "date": "2025-01-20T09:04:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0192-1", "initial_release_date": "2025-01-20T09:04:08Z", "revision_history": [ { "date": "2025-01-20T09:04:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-150000.3.6.1.aarch64", "product": { "name": "pam_u2f-1.0.8-150000.3.6.1.aarch64", "product_id": "pam_u2f-1.0.8-150000.3.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-150000.3.6.1.i586", "product": { "name": "pam_u2f-1.0.8-150000.3.6.1.i586", "product_id": "pam_u2f-1.0.8-150000.3.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-150000.3.6.1.ppc64le", "product": { "name": "pam_u2f-1.0.8-150000.3.6.1.ppc64le", "product_id": "pam_u2f-1.0.8-150000.3.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-150000.3.6.1.s390x", "product": { "name": "pam_u2f-1.0.8-150000.3.6.1.s390x", "product_id": "pam_u2f-1.0.8-150000.3.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.0.8-150000.3.6.1.x86_64", "product": { "name": "pam_u2f-1.0.8-150000.3.6.1.x86_64", "product_id": "pam_u2f-1.0.8-150000.3.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.ppc64le" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.s390x" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.ppc64le" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.x86_64" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.aarch64" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.0.8-150000.3.6.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.x86_64" }, "product_reference": "pam_u2f-1.0.8-150000.3.6.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23013" } ], "notes": [ { "category": "general", "text": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23013", "url": "https://www.suse.com/security/cve/CVE-2025-23013" }, { "category": "external", "summary": "SUSE Bug 1233517 for CVE-2025-23013", "url": "https://bugzilla.suse.com/1233517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Enterprise Storage 7.1:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:pam_u2f-1.0.8-150000.3.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:pam_u2f-1.0.8-150000.3.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-20T09:04:08Z", "details": "important" } ], "title": "CVE-2025-23013" } ] }
opensuse-su-2025:14650-1
Vulnerability from csaf_opensuse
Published
2025-01-15 00:00
Modified
2025-01-15 00:00
Summary
pam_u2f-1.3.1-1.1 on GA media
Notes
Title of the patch
pam_u2f-1.3.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the pam_u2f-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14650
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "pam_u2f-1.3.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the pam_u2f-1.3.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14650", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14650-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23013 page", "url": "https://www.suse.com/security/cve/CVE-2025-23013/" } ], "title": "pam_u2f-1.3.1-1.1 on GA media", "tracking": { "current_release_date": "2025-01-15T00:00:00Z", "generator": { "date": "2025-01-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14650-1", "initial_release_date": "2025-01-15T00:00:00Z", "revision_history": [ { "date": "2025-01-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.1-1.1.aarch64", "product": { "name": "pam_u2f-1.3.1-1.1.aarch64", "product_id": "pam_u2f-1.3.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.1-1.1.ppc64le", "product": { "name": "pam_u2f-1.3.1-1.1.ppc64le", "product_id": "pam_u2f-1.3.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.1-1.1.s390x", "product": { "name": "pam_u2f-1.3.1-1.1.s390x", "product_id": "pam_u2f-1.3.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_u2f-1.3.1-1.1.x86_64", "product": { "name": "pam_u2f-1.3.1-1.1.x86_64", "product_id": "pam_u2f-1.3.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.aarch64" }, "product_reference": "pam_u2f-1.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.ppc64le" }, "product_reference": "pam_u2f-1.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.s390x" }, "product_reference": "pam_u2f-1.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pam_u2f-1.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.x86_64" }, "product_reference": "pam_u2f-1.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23013" } ], "notes": [ { "category": "general", "text": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.aarch64", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.ppc64le", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.s390x", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23013", "url": "https://www.suse.com/security/cve/CVE-2025-23013" }, { "category": "external", "summary": "SUSE Bug 1233517 for CVE-2025-23013", "url": "https://bugzilla.suse.com/1233517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.aarch64", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.ppc64le", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.s390x", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.aarch64", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.ppc64le", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.s390x", "openSUSE Tumbleweed:pam_u2f-1.3.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-15T00:00:00Z", "details": "important" } ], "title": "CVE-2025-23013" } ] }
fkie_cve-2025-23013
Vulnerability from fkie_nvd
Published
2025-01-15 04:15
Modified
2025-02-03 10:15
Severity ?
Summary
In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.yubico.com/support/security-advisories/ysa-2025-01/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/01/15/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/01/16/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/01/16/3 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/01/16/4 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/01/16/5 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2025/02/msg00001.html |
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password." }, { "lang": "es", "value": "En Yubico pam-u2f anterior a la versi\u00f3n 1.3.1, a veces puede producirse una escalada de privilegios locales. Este producto implementa un m\u00f3dulo de autenticaci\u00f3n conectable (PAM) que se puede implementar para admitir la autenticaci\u00f3n mediante una YubiKey u otros autenticadores compatibles con FIDO en macOS o Linux. Este paquete de software tiene un problema que permite omitir la autenticaci\u00f3n en algunas configuraciones. Un atacante necesitar\u00eda poder acceder al sistema como un usuario sin privilegios. Seg\u00fan la configuraci\u00f3n, el atacante tambi\u00e9n podr\u00eda necesitar saber la contrase\u00f1a del usuario." } ], "id": "CVE-2025-23013", "lastModified": "2025-02-03T10:15:09.250", "metrics": { "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cve@mitre.org", "type": "Secondary" } ] }, "published": "2025-01-15T04:15:20.037", "references": [ { "source": "cve@mitre.org", "url": "https://www.yubico.com/support/security-advisories/ysa-2025-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2025/01/15/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00001.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-394" } ], "source": "cve@mitre.org", "type": "Secondary" } ] }
ghsa-wwr4-cj7g-985f
Vulnerability from github
Published
2025-01-15 06:30
Modified
2025-02-03 12:30
Severity ?
VLAI Severity ?
Details
In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password.
{ "affected": [], "aliases": [ "CVE-2025-23013" ], "database_specific": { "cwe_ids": [ "CWE-394" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-01-15T04:15:20Z", "severity": "HIGH" }, "details": "In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user\u0027s password.", "id": "GHSA-wwr4-cj7g-985f", "modified": "2025-02-03T12:30:59Z", "published": "2025-01-15T06:30:49Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23013" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00001.html" }, { "type": "WEB", "url": "https://www.yubico.com/support/security-advisories/ysa-2025-01" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/01/15/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/01/16/5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "type": "CVSS_V4" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…