Search CVE reports


Toggle filters

21 – 30 of 87 results


CVE-2020-1930

Medium priority
Fixed

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched,...

1 affected package

spamassassin

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
spamassassin Fixed
Show less packages

CVE-2020-13881

Low priority

Some fixes available 3 of 11

In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.

1 affected package

libpam-tacplus

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpam-tacplus Not in release Needs evaluation Fixed Fixed
Show less packages

CVE-2020-10595

Medium priority
Fixed

pam-krb5 before 4.9 has a buffer overflow that might cause remote code execution in situations involving supplemental prompting by a Kerberos library. It may overflow a buffer provided by the underlying Kerberos library by a...

1 affected package

libpam-krb5

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpam-krb5 Fixed
Show less packages

CVE-2019-16729

Medium priority

Some fixes available 2 of 4

pam-python before 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM setups.

1 affected package

pam-python

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pam-python Not affected Fixed
Show less packages

CVE-2019-16058

Low priority
Needs evaluation

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096...

1 affected package

pam-p11

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pam-p11 Not affected Not affected Not affected Needs evaluation
Show less packages

CVE-2019-12420

Medium priority
Fixed

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

1 affected package

spamassassin

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
spamassassin Fixed
Show less packages

CVE-2019-12210

Medium priority
Vulnerable

In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the...

1 affected package

pam-u2f

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pam-u2f Not affected Not affected Not affected Vulnerable
Show less packages

CVE-2019-12209

Medium priority
Vulnerable

Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on...

1 affected package

pam-u2f

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pam-u2f Not affected Not affected Not affected Vulnerable
Show less packages

CVE-2018-9275

Medium priority
Needs evaluation

In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device)...

1 affected package

yubico-pam

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
yubico-pam Not affected Not affected Not affected Needs evaluation
Show less packages

CVE-2018-17953

Low priority
Not affected

A incorrect variable in a SUSE specific patch for pam_access rule matching in PAM 1.3.0 in openSUSE Leap 15.0 and SUSE Linux Enterprise 15 could lead to pam_access rules not being applied (fail open).

1 affected package

pam

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pam Not affected
Show less packages