libtac in pamtacplus through 1.5.1 lacks a check for a failure of RANDbytes()/RANDpseudobytes(). This could lead to use of a non-random/predictable session_id.
{ "binaries": [ { "binary_name": "libpam-tacplus", "binary_version": "1.3.8-2+deb8u1build0.16.04.1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-27743.json"
{ "binaries": [ { "binary_name": "libpam-tacplus", "binary_version": "1.3.8-2+deb8u1build0.18.04.1" } ] }
{ "binaries": [ { "binary_name": "libpam-tacplus", "binary_version": "1.3.8-2+deb8u1build0.20.04.1" } ] }
{ "binaries": [ { "binary_name": "libpam-tacplus", "binary_version": "1.3.8-2.1" } ] }