Yubico pam-u2f: Local PIN Bypass vulnerability — GLSA 202208-11

A vulnerability has been discovered in pam-u2f which could allow a local attacker to bypass PIN entry.

Affected packages

sys-auth/pam_u2f on all architectures
Affected versions < 1.1.1
Unaffected versions >= 1.1.1

Background

Yubico pam-u2f is a PAM module for FIDO2 and U2F keys.

Description

A logic issue in Yubico pam-u2f could result in the bypass of a PIN entry requirement when authenticating with FIDO2.

Impact

An attacker with local access to certain applications using pam-u2f for authentication could incorrectly successfully authenticate without entering the authentication PIN.

Workaround

There is no known workaround at this time.

Resolution

All Yubico pam-u2f users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-auth/pam_u2f-1.1.1"
 

References

Release date
August 10, 2022

Latest revision
August 10, 2022: 1

Severity
low

Exploitable
local

Bugzilla entries