Описание
No description is available for this CVE.
Отчет
This issue was rated as a Low severity issue. This is an authorization policy bypass limited to host-based access control decisions. It does not bypass authentication or grant elevated privileges. Exploitation is configuration-dependent and primarily affects legacy or uncommon remote login pathways, but it can violate administrator intent and weaken PAM-based security policy enforcement.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | util-linux | Not affected | ||
| Red Hat Enterprise Linux 7 | util-linux | Not affected | ||
| Red Hat Enterprise Linux 8 | util-linux | Not affected | ||
| Red Hat Enterprise Linux 9 | util-linux | Not affected | ||
| Red Hat OpenShift Container Platform 4 | rhcos | Not affected |
Показывать по
10
Дополнительная информация
Статус:
Low
Дефект:
CWE-289
https://bugzilla.redhat.com/show_bug.cgi?id=2442570util-linux: util-linux: Access control bypass due to improper hostname canonicalization
3.7 Low
CVSS3
Связанные уязвимости
3.7 Low
CVSS3