CVE-2024-37408

Publication date 8 June 2024

Last updated 4 August 2025


Ubuntu priority

Cvss 3 Severity Score

7.3 · High

Score breakdown

Description

fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by "auth sufficient pam_fprintd.so" for Sudo. NOTE: the supplier disputes this because they believe issue resolution would involve modifying the PAM configuration to restrict pam_fprintd.so to front-ends that implement a proper attention mechanism, not modifying pam_fprintd.so or fprintd.

Read the notes from the security team

Status

Package Ubuntu Release Status
fprintd 24.04 LTS noble
Not affected
23.10 mantic Ignored end of life, was deferred [2024-06-17]
22.04 LTS jammy
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic
Not affected
16.04 LTS xenial
Not affected

Notes


mdeslaur

This isn't really a vulnerability in fprintd, it's a limitation when command-line applications use pam for authentication. See mailing list discussion, this CVE was disputed. Marking as not-affected.

Severity score breakdown

Parameter Value
Base score 7.3 · High
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Access our resources on patching vulnerabilities