vulnerability
Ubuntu: (CVE-2019-12210): pam-u2f vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:S/C:P/I:P/A:N) | Jun 4, 2019 | Jun 26, 2025 | Jun 26, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
Jun 4, 2019
Added
Jun 26, 2025
Modified
Jun 26, 2025
Description
In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.
Solution
no-fix-ubuntu-package
References
- CVE-2019-12210
- https://attackerkb.com/topics/CVE-2019-12210
- URL-https://developers.yubico.com/pam-u2f/Release_Notes.html
- URL-https://github.com/Yubico/pam-u2f/commit/18b1914e32b74ff52000f10e97067e841e5fff62
- URL-https://www.cve.org/CVERecord?id=CVE-2019-12210
- URL-https://www.openwall.com/lists/oss-security/2019/06/05/1
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.