Lucene search

K
rosalinuxROSA LABROSA-SA-2024-2456
HistoryJul 23, 2024 - 11:31 a.m.

Advisory ROSA-SA-2024-2456

2024-07-2311:31:42
ROSA LAB
abf.rosalinux.ru
5
selinux
rosa virtualization
cve-2020-24612
2fa
pam-u2f
bypass
second factor

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.3

Confidence

Low

Software: selinux-policy 3.14.3
OS: ROSA Virtualization 2.1

package_evr_string: selinux-policy-3.14.3

CVE-ID: CVE-2020-24612
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: A problem was detected in the selinux-policy package because the .config/Yubico directory is not handled correctly. Consequently, when SELinux is in forced mode, pam-u2f cannot read the user’s U2F configuration file. If configured with the nouserok option (the default when configured with the authselect tool) and this file cannot be read, the second factor is disabled. An attacker who only knows the password can log in by bypassing 2FA.
CVE-STATUS: Not relevant
CVE-REV:

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.3

Confidence

Low