FERRAMENTAS LINUX: Critical Security Update: pam_pkcs11 Vulnerability Patched (CVE-2025-6018)

sábado, 21 de junho de 2025

Critical Security Update: pam_pkcs11 Vulnerability Patched (CVE-2025-6018)

 

SUSE

SUSE releases a critical pam_pkcs11 security update patching CVE-2025-6018 (CVSS 8.6). Learn how to protect your Linux enterprise servers from authentication vulnerabilities. Includes patch instructions for SUSE 12 SP5 systems

SUSE Linux Enterprise Systems Receive Important Fix for Authentication Flaw

Key Details of the Security Update

  • Announcement ID: SUSE-SU-2025:02032-1

  • Release Date: June 20, 2025

  • SeverityImportant (CVSS 8.6 – High Risk)

  • Affected Systems:

    • SUSE Linux Enterprise High Performance Computing 12 SP5

    • SUSE Linux Enterprise Server 12 SP5 (LTSS & Extended Security)

    • SUSE Linux Enterprise Server for SAP Applications 12 SP5


Vulnerability Breakdown: CVE-2025-6018

A critical security flaw in pam_pkcs11, a Pluggable Authentication Module (PAM) for PKCS#11 smart cards, has been resolved. This update removes pam_env from the authentication stack due to potential exploitation risks.

Why This Update Matters

  • Risk Level8.6 (CVSS 4.0) – Local privilege escalation risk.

  • Impact: Unauthorized access to sensitive systems if unpatched.

  • Patch Urgency: Recommended for enterprise Linux environments handling secure authentication.


How to Apply the Update

Recommended Methods

  1. YaST Online Update (GUI)

  2. Command Line (zypper)

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2032=1

    (See full patch commands below for your specific SUSE version.)

Affected Packages

OS VersionPackage Updates
SUSE Linux 12 SP5 LTSSpam_pkcs11-0.6.8-7.13.1 (x86_64, aarch64)
Extended SecurityIncludes 32-bit & debug packages

Why Enterprises Should Prioritize This Patch

  • Compliance Risks: Unpatched systems may violate GDPR, HIPAA, or NIST guidelines.

  • Smart Card Security: Critical for government, healthcare, and financial sectors.

  • Zero-Day Potential: Proactive patching prevents exploitation in secure environments.


Additional Resources

Nenhum comentário:

Postar um comentário