CVE-2020-24612
Summary
| CVE | CVE-2020-24612 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-08-24 21:15:00 UTC |
| Updated | 2020-09-01 19:02:00 UTC |
| Description | An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled. Consequently, when SELinux is in enforced mode, pam-u2f is not allowed to read the user's U2F configuration file. If configured with the nouserok option (the default when configured by the authselect tool), and that file cannot be read, the second factor is disabled. An attacker with only the knowledge of the password can then log in, bypassing 2FA. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Add file context for ~/.config/Yubico · fedora-selinux/selinux-policy@71e1989 · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| 1860888 – [authselect] Obligatory 2FA doesn't work |
MISC |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 671931 EulerOS Security Update for selinux-policy (EulerOS-SA-2022-2012)
- 671960 EulerOS Security Update for selinux-policy (EulerOS-SA-2022-1982)
- 671968 EulerOS Security Update for selinux-policy (EulerOS-SA-2022-2146)
- 672010 EulerOS Security Update for selinux-policy (EulerOS-SA-2022-2171)