Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-3184

Опубликовано: 25 фев. 2026
Источник: redhat
CVSS3: 3.7

Описание

No description is available for this CVE.

Отчет

This issue was rated as a Low severity issue. This is an authorization policy bypass limited to host-based access control decisions. It does not bypass authentication or grant elevated privileges. Exploitation is configuration-dependent and primarily affects legacy or uncommon remote login pathways, but it can violate administrator intent and weaken PAM-based security policy enforcement.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10util-linuxNot affected
Red Hat Enterprise Linux 7util-linuxNot affected
Red Hat Enterprise Linux 8util-linuxNot affected
Red Hat Enterprise Linux 9util-linuxNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-289
https://bugzilla.redhat.com/show_bug.cgi?id=2442570util-linux: util-linux: Access control bypass due to improper hostname canonicalization

3.7 Low

CVSS3

Связанные уязвимости

ubuntu
15 дней назад

[Access control bypass due to improper hostname canonicalization]

debian

[Access control bypass due to improper hostname canonicalization]

suse-cvrf
3 дня назад

Security update for util-linux

suse-cvrf
9 дней назад

Security update for util-linux

3.7 Low

CVSS3