Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2024-10963

Published: November 8, 2024Last modified: June 5, 2025

Description

A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control.

Severity score breakdown

ParameterValue
Base score7.4
Attack VectorNETWORK
Attack complexityHIGH
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactNONE
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Notes

https://github.com/linux-pam/linux-pam/issues/834 Considered a minor problem (using untrustworthy DNS setup for authentication). Introduced in 1.5.3 and so 23-lts (with 1.5.2) is not affected. PR for the rework that fixes the issue (and another minor problem): https://github.com/linux-pam/linux-pam/pull/854

Status

ProductReleasePackageStatus
Alpaquita LinuxStreamlinux-pamVulnerable (1.5.3-r3)

References

ON THIS PAGE