Required CVE Record Information
Description
In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.
References 5 Total
- https://developers.yubico.com/pam-u2f/Release_Notes.html
- https://github.com/Yubico/pam-u2f/commit/18b1914e32b74ff52000f10e97067e841e5fff62
- openwall.com: [oss-security] 20190605 pam-u2f: CVE-2019-12210: debug_file file descriptor leak, CVE-2019-12209: symlink attack on u2f_keys leading to possible information leak mailing-list
- lists.opensuse.org: openSUSE-SU-2019:1708 vendor-advisory
- lists.opensuse.org: openSUSE-SU-2019:1725 vendor-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 5 Total
- https://developers.yubico.com/pam-u2f/Release_Notes.html x_transferred
- https://github.com/Yubico/pam-u2f/commit/18b1914e32b74ff52000f10e97067e841e5fff62 x_transferred
- openwall.com: [oss-security] 20190605 pam-u2f: CVE-2019-12210: debug_file file descriptor leak, CVE-2019-12209: symlink attack on u2f_keys leading to possible information leak mailing-listx_transferred
- lists.opensuse.org: openSUSE-SU-2019:1708 vendor-advisoryx_transferred
- lists.opensuse.org: openSUSE-SU-2019:1725 vendor-advisoryx_transferred