Security update for libu2f-host

SUSE Security Update: Security update for libu2f-host
Announcement ID: SUSE-SU-2019:1749-1
Rating: moderate
References: #1124781 #1128140 #1135727 #1135729
Cross-References: CVE-2018-20340 CVE-2019-12209 CVE-2019-12210 CVE-2019-9578
Affected Products:
  • SUSE Linux Enterprise Server 12-SP4
  • SUSE Linux Enterprise Desktop 12-SP4

An update that fixes four vulnerabilities is now available.

Description:

This update for libu2f-host and pam_u2f to version 1.0.8 fixes the following issues:
Security issues fixed for libu2f-host:

  • CVE-2019-9578: Fixed a memory leak due to a wrong parse of init's response (bsc#1128140).
  • CVE-2018-20340: Fixed an unchecked buffer, which could allow a buffer overflow with a custom made malicious USB device (bsc#1124781).

Security issues fixed for pam_u2f:
  • CVE-2019-12209: Fixed an issue where symlinks in the user's directory were followed (bsc#1135729).
  • CVE-2019-12210: Fixed file descriptor leaks (bsc#1135727).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-SP4:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1749=1
  • SUSE Linux Enterprise Desktop 12-SP4:
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1749=1

Package List:

  • SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
    • libu2f-host-debugsource-1.1.6-3.5.1
    • libu2f-host0-1.1.6-3.5.1
    • libu2f-host0-debuginfo-1.1.6-3.5.1
    • pam_u2f-1.0.8-3.3.1
    • pam_u2f-debuginfo-1.0.8-3.3.1
    • pam_u2f-debugsource-1.0.8-3.3.1
  • SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
    • libu2f-host-debugsource-1.1.6-3.5.1
    • libu2f-host0-1.1.6-3.5.1
    • libu2f-host0-debuginfo-1.1.6-3.5.1
    • pam_u2f-1.0.8-3.3.1
    • pam_u2f-debuginfo-1.0.8-3.3.1
    • pam_u2f-debugsource-1.0.8-3.3.1

References: