diff options
author | Polampalli, Archana <archana.polampalli@windriver.com> | 2022-10-28 16:30:22 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-12-07 15:02:45 +0000 |
commit | c2419998808b032a91f0358c6f043d7321a6acf9 (patch) | |
tree | b595ee54ccae6351d56b76d307907ea68cb82310 /scripts/lib/build_perf/html.py | |
parent | 183f2ddcf64584a38044f61c3123ad653d659fe7 (diff) | |
download | poky-c2419998808b032a91f0358c6f043d7321a6acf9.tar.gz |
libpam: fix CVE-2022-28321
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows
authentication bypass for SSH logins. The pam_access.so module doesn't
correctly restrict login if a user tries to connect from an IP address
that is not resolvable via DNS. In such conditions, a user with denied
access to a machine can still get access. NOTE: the relevance of this
issue is largely limited to openSUSE Tumbleweed and openSUSE Factory;
it does not affect Linux-PAM upstream.
References:
https://nvd.nist.gov/vuln/detail/CVE-2022-28321
Upstream patches:
https://github.com/linux-pam/linux-pam/commit/08992030c56c940c0707ccbc442b1c325aa01e6d
https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f
(From OE-Core rev: 399d4986a7707c081dd5da1991647cb02cbea69c)
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
(cherry picked from commit b1fd799af0086347de1ec4b72d562b1fb490def1)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/build_perf/html.py')
0 files changed, 0 insertions, 0 deletions