DescriptionIn check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs896491

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
yubico-pam (PTS)buster2.26-1fixed
sid, bookworm, bullseye2.26-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
yubico-pamsourcewheezy(not affected)
yubico-pamsourcejessie(not affected)


[stretch] - yubico-pam <no-dsa> (Minor issue)
[jessie] - yubico-pam <not-affected> (Vulnerable code introduced later)
[wheezy] - yubico-pam <not-affected> (Vulnerable code introduced later)
Fixed by:
Introduced in: (2.18)

Search for package or bug name: Reporting problems