]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commit
libpam: fix CVE-2022-28321
authorPolampalli, Archana <archana.polampalli@windriver.com>
Fri, 28 Oct 2022 16:30:22 +0000 (16:30 +0000)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 23 Nov 2022 18:26:34 +0000 (18:26 +0000)
commitb1fd799af0086347de1ec4b72d562b1fb490def1
tree45f8e5afa1dab72c01a7aed309d2a363a0b023cd
parent163966765d57fe38e13d0b6659795a13bc702e2d
libpam: fix CVE-2022-28321

The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows
authentication bypass for SSH logins. The pam_access.so module doesn't
correctly restrict login if a user tries to connect from an IP address
that is not resolvable via DNS. In such conditions, a user with denied
access to a machine can still get access. NOTE: the relevance of this
issue is largely limited to openSUSE Tumbleweed and openSUSE Factory;
it does not affect Linux-PAM upstream.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-28321

Upstream patches:
https://github.com/linux-pam/linux-pam/commit/08992030c56c940c0707ccbc442b1c325aa01e6d
https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
meta/recipes-extended/pam/libpam/CVE-2022-28321-0002.patch [new file with mode: 0644]
meta/recipes-extended/pam/libpam_1.5.2.bb