|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
PAM U2F: information disclosure via File Descriptor
Synthesis of the vulnerability
An attacker can bypass access restrictions to data via File Descriptor of PAM U2F, in order to obtain sensitive information.
Vulnerable products: Fedora.
Severity of this weakness: 2/4.
Consequences of an attack: data reading.
Hacker's origin: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 13/08/2019.
Références of this bulletin: CVE-2019-1220, CVE-2019-1221, FEDORA-2019-cd8f4b9568, VIGILANCE-VUL-30024.
Description of the vulnerability
An attacker can bypass access restrictions to data via File Descriptor of PAM U2...
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides network vulnerability analysis. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.