Bug 2175261 (CVE-2022-28321) - CVE-2022-28321 pam: authentication bypass for SSH logins
Summary: CVE-2022-28321 pam: authentication bypass for SSH logins
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-28321
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2164521
TreeView+ depends on / blocked
 
Reported: 2023-03-03 17:17 UTC by Marco Benatto
Modified: 2023-03-21 11:30 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2023-03-03 17:18:04 UTC
Embargoed:


Attachments (Terms of Use)

Description Marco Benatto 2023-03-03 17:17:04 UTC
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.


Note You need to log in before you can comment on or make changes to this bug.