CVE-2026-3184
Published: March 3, 2026Last modified: March 13, 2026
Description
A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.3 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | LOW |
| Availability impact | NONE |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | util-linux | Fixed (2.38.1-r6) |
| 25 LTS | util-linux | Fixed (2.41-r8) | |
| Stream | util-linux | Fixed (2.41.3-r1) | |
| Hardened Containers | 23 LTS | util-linux | Fixed (2.38.1-r6) |
| 25 LTS | util-linux | Fixed (2.41-r8) | |
| Stream | util-linux | Fixed (2.41.3-r1) |