First published: Mon Sep 19 2022(Updated: )
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux-pam Linux-pam | <1.5.2-6.1 | |
openSUSE Tumbleweed |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-28321 is critical.
CVE-2022-28321 allows authentication bypass for SSH logins by not correctly restricting login if a user tries to connect from an IP address that is not resolvable via DNS.
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed is affected by CVE-2022-28321.
To fix CVE-2022-28321 in the Linux-PAM package, update to version 1.5.2-6.1 or later.
You can find more information about CVE-2022-28321 at the following references: [1] [2] [3].