-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-4058-1 [email protected] https://www.debian.org/lts/security/ Emilio Pozuelo Monfort February 18, 2025 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : pam-pkcs11 Version : 0.6.11-4+deb11u1 CVE ID : CVE-2025-24032 A vulnerability was discovered in pam-pkcs11, a PAM module which allows to use PKCS#11 based smart cards in the PAM authentication stack, which may allow to bypass the authentication in some scenarios. For Debian 11 bullseye, this problem has been fixed in version 0.6.11-4+deb11u1. We recommend that you upgrade your pam-pkcs11 packages. For the detailed security status of pam-pkcs11 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/pam-pkcs11 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAme0etUACgkQnUbEiOQ2 gwLtZA//UDHBFhMJdrBaEn8PKBKUFHZUh0+TM8Yasou1IEdX8W89bH8msyhAM64z 1ikphp8Ps6I8/BXMWL703zk90yGnCX5H3IPilCiLaYHsbnvQCpc1LOoAAT0kqMjU 3ClQwNxiifm3SgJ/WZ+7lxFyCtyD6cKrm0+SozOtWNty+EraHE2qlbivmxQfBw4Z uIERDT9IqP7RKFO+vZusjTYsfgqffU636c3LZ6mimhfdvD6YwjpzksDxzfPhOtW/ mlWJ93l33Q5GSH9GkMwydvmTykipMIYiksN1yoE4qk1v41Ga+ZhPUI/4lYCwBOMo MUbddxvPmME9WQPN1eK7LWiXK4bATGrC8vpd51V+m2gyI3XJhjs7AGIbhl8Tp9+o qhX8nLaXMeXWFEP206cL0U2ggr0acTUzg2vLK25I6PI6YCOJ3J1LNdaKNxkNztjL gVxsmTb4D2Xu5GEb4NokgPmTZQOE/9q1lgEHaGffGWqxKQOx5NOBbSGneCrjuCoD mdvgVVwjYjHMpgIx87O0Zg0FUNAgoOKUmqNsjCV369rutCjkbA3e3QFOgdfWr8KS K9sq3wR+BM/ypj+IZgWI+d3NihmHSPH3NKre8uA+AGuSXWpd2X7FfeUfvCbu757N 22bZ0hxSKceQHjRfbskoRxUqyoopvMJb9uVk+FFXDN9j4gUqoDE= =Ew0L -----END PGP SIGNATURE-----
