A vulnerability in pam_access allows unauthorized users to bypass access restrictions by spoofing hostnames. This occurs because pam_access improperly interprets local access.conf rules to match remote hostnames, compromising configurations intended to restrict local access only. The issue affects all deployments using this configuration method, posing a significant risk to secure environments.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2024:10232 https://access.redhat.com/errata/RHSA-2024:10232
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:10244 https://access.redhat.com/errata/RHSA-2024:10244
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10379 https://access.redhat.com/errata/RHSA-2024:10379
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.17 Via RHSA-2024:10518 https://access.redhat.com/errata/RHSA-2024:10518
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2024:10528 https://access.redhat.com/errata/RHSA-2024:10528
Hello Team, We can see OpenShift 4.16 and 4.17 listed in the affected components section and a fix has been released for both versions. I have a customer using OpenShift 4.14.41. We would like to know if the fix has been backported to OpenShift 4.14.41.