Source: pam
Version: 1.5.3-7
Severity: important
Tags: security upstream
Forwarded: https://github.com/linux-pam/linux-pam/issues/834
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for pam.

CVE-2024-10963[0]:
| A vulnerability was found in pam_access due to the improper handling
| of tokens in access.conf, interpreted as hostnames. This flaw allows
| attackers to bypass access restrictions by spoofing hostnames,
| undermining configurations designed to limit access to specific TTYs
| or services. The flaw poses a risk in environments relying on these
| configurations for local access control.

At this time, 2024-11-08 it is unclear if upstream is going to change
the behaviour and discussion is still ongoing o nthe upstream issue.
This bug servers to track this upstream issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-10963
    https://www.cve.org/CVERecord?id=CVE-2024-10963
[1] https://github.com/linux-pam/linux-pam/issues/834

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to