CVE-2018-9275

NameCVE-2018-9275
DescriptionIn check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs896491

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
yubico-pam (PTS)buster2.26-1fixed
sid, bookworm, bullseye2.26-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
yubico-pamsourcewheezy(not affected)
yubico-pamsourcejessie(not affected)
yubico-pamsource(unstable)2.26-1896491

Notes

[stretch] - yubico-pam <no-dsa> (Minor issue)
[jessie] - yubico-pam <not-affected> (Vulnerable code introduced later)
[wheezy] - yubico-pam <not-affected> (Vulnerable code introduced later)
https://bugzilla.opensuse.org/show_bug.cgi?id=1088027
Fixed by: https://github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba
Introduced in: https://github.com/Yubico/yubico-pam/commit/d9780eacd9e61c5062cdabdce21c224de1884583 (2.18)
https://github.com/Yubico/yubico-pam/issues/136

Search for package or bug name: Reporting problems