<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libu2f-host, pam_u2f</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1725-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-07-19T15:59:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-07-19T15:59:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-07-19T15:59:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libu2f-host, pam_u2f</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libu2f-host and pam_u2f to version 1.0.8 fixes the following issues:

Security issues fixed for libu2f-host: 

- CVE-2019-9578: Fixed a memory leak due to a wrong parse of init's response (bsc#1128140).

Security issues fixed for pam_u2f:

- CVE-2019-12209: Fixed an issue where symlinks in the user's directory were followed (bsc#1135729).
- CVE-2019-12210: Fixed file descriptor leaks (bsc#1135727).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1725</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB/#7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1725-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1128140</URL>
      <Description>SUSE Bug 1128140</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135727</URL>
      <Description>SUSE Bug 1135727</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135729</URL>
      <Description>SUSE Bug 1135729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12209/</URL>
      <Description>SUSE CVE CVE-2019-12209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12210/</URL>
      <Description>SUSE CVE CVE-2019-12210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9578/</URL>
      <Description>SUSE CVE CVE-2019-9578 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libu2f-host-devel-1.1.6-lp150.10.1">
      <FullProductName ProductID="libu2f-host-devel-1.1.6-lp150.10.1">libu2f-host-devel-1.1.6-lp150.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libu2f-host-doc-1.1.6-lp150.10.1">
      <FullProductName ProductID="libu2f-host-doc-1.1.6-lp150.10.1">libu2f-host-doc-1.1.6-lp150.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libu2f-host0-1.1.6-lp150.10.1">
      <FullProductName ProductID="libu2f-host0-1.1.6-lp150.10.1">libu2f-host0-1.1.6-lp150.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pam_u2f-1.0.8-lp150.7.1">
      <FullProductName ProductID="pam_u2f-1.0.8-lp150.7.1">pam_u2f-1.0.8-lp150.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="u2f-host-1.1.6-lp150.10.1">
      <FullProductName ProductID="u2f-host-1.1.6-lp150.10.1">u2f-host-1.1.6-lp150.10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libu2f-host-devel-1.1.6-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libu2f-host-devel-1.1.6-lp150.10.1">libu2f-host-devel-1.1.6-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libu2f-host-doc-1.1.6-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libu2f-host-doc-1.1.6-lp150.10.1">libu2f-host-doc-1.1.6-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libu2f-host0-1.1.6-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libu2f-host0-1.1.6-lp150.10.1">libu2f-host0-1.1.6-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="pam_u2f-1.0.8-lp150.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:pam_u2f-1.0.8-lp150.7.1">pam_u2f-1.0.8-lp150.7.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="u2f-host-1.1.6-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:u2f-host-1.1.6-lp150.10.1">u2f-host-1.1.6-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.</Note>
    </Notes>
    <CVE>CVE-2019-12209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libu2f-host-devel-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libu2f-host-doc-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libu2f-host0-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:pam_u2f-1.0.8-lp150.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:u2f-host-1.1.6-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB/#7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12209.html</URL>
        <Description>CVE-2019-12209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087061</URL>
        <Description>SUSE Bug 1087061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135727</URL>
        <Description>SUSE Bug 1135727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135729</URL>
        <Description>SUSE Bug 1135729</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.</Note>
    </Notes>
    <CVE>CVE-2019-12210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libu2f-host-devel-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libu2f-host-doc-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libu2f-host0-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:pam_u2f-1.0.8-lp150.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:u2f-host-1.1.6-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB/#7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12210.html</URL>
        <Description>CVE-2019-12210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087061</URL>
        <Description>SUSE Bug 1087061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135727</URL>
        <Description>SUSE Bug 1135727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135729</URL>
        <Description>SUSE Bug 1135729</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device.</Note>
    </Notes>
    <CVE>CVE-2019-9578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libu2f-host-devel-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libu2f-host-doc-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libu2f-host0-1.1.6-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:pam_u2f-1.0.8-lp150.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:u2f-host-1.1.6-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB/#7L2J54VOSWKWWHDQ3LUR6WDVPL2TE6XB</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9578.html</URL>
        <Description>CVE-2019-9578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128140</URL>
        <Description>SUSE Bug 1128140</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
