Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:10379

Опубликовано: 19 дек. 2024
Источник: rocky
Оценка: Important

Описание

Important: pam security update

Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.

Security Fix(es):

  • pam: libpam: Libpam vulnerable to read hashed password (CVE-2024-10041)

  • pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
pamx86_6436.el8_10pam-1.3.1-36.el8_10.x86_64.rpm
pam-develx86_6436.el8_10pam-devel-1.3.1-36.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
8 месяцев назад

ELSA-2024-10379: pam security update (IMPORTANT)

CVSS3: 7.4
ubuntu
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
redhat
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
nvd
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
msrc
7 месяцев назад

Описание отсутствует