Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0ffab6a0-3e06-4722-89bb-531cc84e44ff@linuxfromscratch.org>
Date: Thu, 6 Feb 2025 15:28:48 -0600
From: "Douglas R. Reno" <renodr@...uxfromscratch.org>
To: oss-security@...ts.openwall.com
Subject: Re: pam_pkcs11: Possible Authentication Bypass in Error Situations
 (CVE-2025-24531)


On 2/6/25 8:55 AM, Matthias Gerstner wrote:
> 4) Affected Distributions and Configurations
> ============================================
>
> The issue was introduced in pam_pkcs11 version 0.6.12, released in July
> 2021. Any PAM stack that relies on pam_pkcs11 as the only
> authentication factor will be affected by the issue.
>
> On openSUSE Tumbleweed the issue became apparent only due to the
> mentioned changes in GDM [7], which cause YubiKeys to be treated as
> smart cards in some situations. We believe plugging in any kind of
> mismatching smart card (or YubiKey) on openSUSE Tumbleweed with GDM as a
> display manager will allow to bypass login.
>
> Similar situations could occur on other Linux distributions if GDM smart
> card login is enabled and smart cards are autodetected. Even then, an
> affected "gdm-smartcard" PAM stack still needs to be in place for the
> issue to trigger. gdm-smartcard PAM stacks relying on pam_pkcs11 are
> found in the GDM repository for:
>
> - Arch Linux [22]
> - Exherbo Linux [23]
> - Linux from Scratch [24]

Hello Matthias!

I wanted to chime in here on behalf of my official capacity at Linux 
 From Scratch. We don't carry the pam_pkcs11 module, so I don't think 
our users are affected by this particular vulnerability either.

Douglas Reno
Linux From Scratch

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.