Description
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
Problem types
Product status
1.3.1 (semver)
1.5.1 (semver)
1.6.0 (semver) before 1.7.0
0:1.3.1-36.el8_10 (rpm) before *
0:1.5.1-22.el9_5 (rpm) before *
0:1.5.1-22.el9_5 (rpm) before *
0:1.5.1-23.el9_4 (rpm) before *
416.94.202411261619-0 (rpm) before *
417.94.202411261220-0 (rpm) before *
sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644 (rpm) before *
Timeline
| 2024-11-07: | Reported to Red Hat. |
| 2024-11-07: | Made public. |
References
access.redhat.com/errata/RHSA-2024:10232 (RHSA-2024:10232)
access.redhat.com/errata/RHSA-2024:10244 (RHSA-2024:10244)
access.redhat.com/errata/RHSA-2024:10379 (RHSA-2024:10379)
access.redhat.com/errata/RHSA-2024:10518 (RHSA-2024:10518)
access.redhat.com/errata/RHSA-2024:10528 (RHSA-2024:10528)
access.redhat.com/errata/RHSA-2024:10852 (RHSA-2024:10852)
access.redhat.com/security/cve/CVE-2024-10963
bugzilla.redhat.com/show_bug.cgi?id=2324291 (RHBZ#2324291)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.