summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/bluez/bluez4-4.101/bluetooth.conf
diff options
context:
space:
mode:
authorPolampalli, Archana <archana.polampalli@windriver.com>2022-10-28 16:30:22 (GMT)
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-11-23 18:27:07 (GMT)
commitb5596124ee7b2e0685f010de9659ed3c76f5d2b4 (patch)
tree0d38a3e6fe9560e7a5369130cb5006899157f2ba /meta/recipes-connectivity/bluez/bluez4-4.101/bluetooth.conf
parent61fac62194b3c7e1c31a9119390f4f960077dea4 (diff)
downloadpoky-master.tar.gz
libpam: fix CVE-2022-28321HEADmaster
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream. References: https://nvd.nist.gov/vuln/detail/CVE-2022-28321 Upstream patches: https://github.com/linux-pam/linux-pam/commit/08992030c56c940c0707ccbc442b1c325aa01e6d https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f (From OE-Core rev: b1fd799af0086347de1ec4b72d562b1fb490def1) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/bluez/bluez4-4.101/bluetooth.conf')
0 files changed, 0 insertions, 0 deletions