vulnerability
Arch Linux: Arbitrary code execution (CVE-2018-20340)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Mar 17, 2019 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Mar 17, 2019
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Yubico library libu2f-host prior to version 1.1.7 contains an unchecked buffer, which could allow a buffer overflow. Libu2f-host is a library that implements the host party of the U2F protocol. This issue can allow an attacker with a custom made malicious USB device masquerading as a security key, and physical access to a computer where PAM U2F or an application with libu2f-host integrated, to potentially execute arbitrary code on that computer. Users of the YubiKey PAM U2F Tool are the most impacted since the arbitrary code could execute with elevated privileges.
Solution
arch-linux-upgrade-latest
References
- CVE-2018-20340
- https://attackerkb.com/topics/CVE-2018-20340
- URL-https://blog.inhq.net/posts/yubico-libu2f-host-vuln-part1/
- URL-https://developers.yubico.com/libu2f-host/Release_Notes.html
- URL-https://seclists.org/bugtraq/2019/Feb/23
- URL-https://security.archlinux.org/ASA-201902-7
- URL-https://security.gentoo.org/glsa/202004-15
- URL-https://www.debian.org/security/2019/dsa-4389
- URL-https://www.yubico.com/support/security-advisories/ysa-2019-01/
- CWE-119
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.