File _patchinfo of Package patchinfo.10302

<patchinfo incident="10302">
  <issue tracker="bnc" id="1135729">VUL-0: CVE-2019-12209: pam_u2f: symlinks are followed</issue>
  <issue tracker="bnc" id="1135727">VUL-0: CVE-2019-12210: pam_u2f: file descriptor leak</issue>
  <issue tracker="bnc" id="1124781">VUL-1: CVE-2018-20340: libu2f-host: Unchecked Buffer in libu2f-host</issue>
  <issue tracker="bnc" id="1128140">VUL-1: CVE-2019-9578: libu2f-host: the response to init is misparsed leaking uninitialized stack memory back to the device</issue>
  <issue tracker="cve" id="2019-12209"/>
  <issue tracker="cve" id="2019-12210"/>
  <issue tracker="cve" id="2018-20340"/>
  <issue tracker="cve" id="2019-9578"/>
  <category>security</category>
  <rating>moderate</rating>
  <packager>kbabioch</packager>
  <description>This update for libu2f-host and pam_u2f to version 1.0.8 fixes the following issues:
	  
Security issues fixed for libu2f-host: 

- CVE-2019-9578: Fixed a memory leak due to a wrong parse of init's response (bsc#1128140).
- CVE-2018-20340: Fixed an unchecked buffer, which could allow a buffer overflow 
  with a custom made malicious USB device (bsc#1124781).

Security issues fixed for pam_u2f:

- CVE-2019-12209: Fixed an issue where symlinks in the user's directory were followed (bsc#1135729).
- CVE-2019-12210: Fixed file descriptor leaks (bsc#1135727).
</description>
  <summary>Security update for libu2f-host</summary>
</patchinfo>
openSUSE Build Service is sponsored by