Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-3184

Источник: debian

Описание

[Access control bypass due to improper hostname canonicalization]

Пакеты

ПакетСтатусВерсия исправленияРелизТип
util-linuxfixed2.42~rc1-1experimentalpackage
util-linuxunfixedpackage
util-linuxno-dsatrixiepackage
util-linuxignoredbookwormpackage
util-linuxignoredbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2442570

  • Fixed by: https://github.com/util-linux/util-linux/commit/8b29aeb081e297e48c4c1ac53d88ae07e1331984 (v2.42-rc1)

Связанные уязвимости

ubuntu
30 дней назад

[Access control bypass due to improper hostname canonicalization]

CVSS3: 3.7
redhat
около 1 месяца назад

A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.

suse-cvrf
17 дней назад

Security update for util-linux

suse-cvrf
23 дня назад

Security update for util-linux