Source: yubico-pam Version: 2.18-1 Severity: important Tags: patch security upstream Forwarded: https://github.com/Yubico/yubico-pam/issues/136
Hi, The following vulnerability was published for yubico-pam. CVE-2018-9275[0]: | In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) | 2.18 through 2.25, successful logins can leak file descriptors to the | auth mapping file, which can lead to information disclosure (serial | number of a device) and/or DoS (reaching the maximum number of file | descriptors). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-9275 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9275 [1] https://github.com/Yubico/yubico-pam/issues/136 [2] https://github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba Regards, Salvatore

