Github.Com Ubuntu Authd vulnerabilities

3 known vulnerabilities affecting github.com/ubuntu_authd.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2025-5689MEDIUM≥ 0, < 0.5.42025-06-16
CVE-2025-5689 [MEDIUM] CWE-266 New authd users logging in via SSH are members of the root group New authd users logging in via SSH are members of the root group ### Impact When an authd user logs in via SSH for the first time (meaning they do not yet exist in the authd user database) and successfully authenticates via the configured broker, the user is considered a member of the root group in the context of that SSH session. This situation may allow the user to read and write files that are acc
ghsaosv
CVE-2024-9312MEDIUM≥ 0, ≤ 0.0.0-20230706090440-d8cb2d5614192024-10-10
CVE-2024-9312 [MEDIUM] CWE-286 Authd allows attacker-controlled usernames to yield controllable UIDs Authd allows attacker-controlled usernames to yield controllable UIDs CVE description: Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges. ----- original report ----- # Cause authd assigns user IDs as a pure function of the user name. Moreover, the set
ghsaosv
CVE-2024-9313HIGH≥ 0, < 0.0.0-20240930103526-63e527496b01≥ 0.1.0, < 0.3.52024-10-03
CVE-2024-9313 [HIGH] CWE-287 PAM module may allow accessing with the credentials of another user PAM module may allow accessing with the credentials of another user Authd PAM module up to version 0.3.4 can allow broker-managed users to impersonate any other user managed by the same broker and perform any PAM operation with it, including authenticating as them. This is possible using tools such as `su`, `sudo` or `ssh` (and potentially others) that, so far, do not ensure that the PAM user at th
ghsaosv