13 Star 0 Fork 40

src-openEuler/pam

 / 详情

CVE-2024-10963

已完成
CVE和安全问题 拥有者
创建于  
2024-11-08 03:28

一、漏洞信息
漏洞编号:CVE-2024-10963
漏洞归属组件:pam
漏洞归属的版本:1.4.0,1.5.1,1.5.2,1.5.3
CVSS V3.0分值:
BaseScore:7.4 High
Vector:CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
漏洞简述:
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
漏洞公开时间:2024-11-08 00:15:17
漏洞创建时间:2024-11-08 03:28:15
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2024-10963

更多参考(点击展开)
参考来源 参考链接 来源链接
secalert.redhat.com https://access.redhat.com/security/cve/CVE-2024-10963
secalert.redhat.com https://bugzilla.redhat.com/show_bug.cgi?id=2324291
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-10963 https://bugzilla.suse.com/show_bug.cgi?id=1233078
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2324291 https://bugzilla.suse.com/show_bug.cgi?id=1233078
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2024-10963 https://bugzilla.suse.com/show_bug.cgi?id=1233078
suse_bugzilla https://access.redhat.com/security/cve/CVE-2024-10963 https://bugzilla.suse.com/show_bug.cgi?id=1233078
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:10232 https://bugzilla.redhat.com/show_bug.cgi?id=2324291
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:10244 https://bugzilla.redhat.com/show_bug.cgi?id=2324291
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:10379 https://bugzilla.redhat.com/show_bug.cgi?id=2324291
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:10518 https://bugzilla.redhat.com/show_bug.cgi?id=2324291
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:10528 https://bugzilla.redhat.com/show_bug.cgi?id=2324291
debian https://security-tracker.debian.org/tracker/CVE-2024-10963
anolis https://anas.openanolis.cn/cves/detail/CVE-2024-10963
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2024-10963 https://explore.alas.aws.amazon.com/CVE-2024-10963.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963 https://explore.alas.aws.amazon.com/CVE-2024-10963.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)

二、漏洞分析结构反馈
影响性分析说明:
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
openEuler评分:
7.4
Vector:CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
受影响版本排查(受影响/不受影响):
1.master(1.5.3):受影响
2.openEuler-20.03-LTS-SP4(1.4.0):受影响
3.openEuler-22.03-LTS-SP1(1.5.2):受影响
4.openEuler-22.03-LTS-SP3(1.5.2):受影响
5.openEuler-22.03-LTS-SP4(1.5.2):受影响
6.openEuler-24.03-LTS(1.5.3):受影响
7.openEuler-24.03-LTS-Next(1.5.3):受影响
8.openEuler-24.03-LTS-SP1:受影响

修复是否涉及abi变化(是/否):
1.master(1.5.3):否
2.openEuler-20.03-LTS-SP4(1.4.0):否
3.openEuler-22.03-LTS-SP1(1.5.2):否
4.openEuler-22.03-LTS-SP3(1.5.2):否
5.openEuler-22.03-LTS-SP4(1.5.2):否
6.openEuler-24.03-LTS(1.5.3):否
7.openEuler-24.03-LTS-Next(1.5.3):否
8.openEuler-24.03-LTS-SP1:否

原因说明:
1.master(1.5.3):正常修复
2.openEuler-20.03-LTS-SP4(1.4.0):正常修复
3.openEuler-22.03-LTS-SP1(1.5.2):正常修复
4.openEuler-22.03-LTS-SP3(1.5.2):正常修复
5.openEuler-22.03-LTS-SP4(1.5.2):正常修复
6.openEuler-24.03-LTS(1.5.3):正常修复
7.openEuler-24.03-LTS-Next(1.5.3):正常修复
8.openEuler-24.03-LTS-SP1:正常修复

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2024-2501

评论 (16)

openeuler-ci-bot 创建了CVE和安全问题 6个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
6个月前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/sig-security-fac
标签
6个月前
openeuler-ci-bot 计划开始日期设置为2024-11-08 6个月前
openeuler-ci-bot 计划截止日期设置为2024-12-08 6个月前
openeuler-ci-bot 优先级设置为次要 6个月前
openeuler-ci-bot 修改了描述 6个月前
openeuler-ci-bot 修改了描述 6个月前

该cve目前未披露出更多有效信息,待业界以及上游提供更多的信息之后再进行影响分析

openeuler-ci-bot 修改了描述 6个月前
houmingyong 任务状态待办的 修改为已挂起 6个月前
openeuler-ci-bot 任务状态已挂起 修改为待办的 6个月前

/reason 该cve目前未披露出更多有效信息,待业界以及上游提供更多的信息之后再进行影响分析

houmingyong 任务状态待办的 修改为已挂起 6个月前
issue状态 操作者 原因
已挂起 houmingyong 该cve目前未披露出更多有效信息,待业界以及上游提供更多的信息之后再进行影响分析

此漏洞Circle Linux 8.10已修复,是否可以参照进行修复?

https://github.com/linux-pam/linux-pam/issues/834

参考上游讨论,等下最终的结论吧

现在 SLO 还有些时间

houmingyong 任务状态已挂起 修改为进行中 5个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 移除了
 
sig/sig-security-fac
标签
5个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 添加了
 
sig/sig-security-fac
标签
5个月前

影响性分析说明:
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
openEuler评分: (评分和向量)
BaseScore:7.4 High
Vector:CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
受影响版本排查(受影响/不受影响):
1.master(1.5.3):受影响
2.openEuler-20.03-LTS-SP4(1.4.0):受影响
3.openEuler-22.03-LTS-SP1(1.5.2):受影响
4.openEuler-22.03-LTS-SP3(1.5.2):受影响
5.openEuler-22.03-LTS-SP4(1.5.2):受影响
6.openEuler-24.03-LTS(1.5.3):受影响
7.openEuler-24.03-LTS-Next(1.5.3):受影响

修复是否涉及abi变化(是/否):
1.master(1.5.3):否
2.openEuler-20.03-LTS-SP4(1.4.0):否
3.openEuler-22.03-LTS-SP1(1.5.2):否
4.openEuler-22.03-LTS-SP3(1.5.2):否
5.openEuler-22.03-LTS-SP4(1.5.2):否
6.openEuler-24.03-LTS(1.5.3):否
7.openEuler-24.03-LTS-Next(1.5.3):否

原因说明:
1.master(1.5.3):正常修复
2.openEuler-20.03-LTS-SP4(1.4.0):正常修复
3.openEuler-22.03-LTS-SP1(1.5.2):正常修复
4.openEuler-22.03-LTS-SP3(1.5.2):正常修复
5.openEuler-22.03-LTS-SP4(1.5.2):正常修复
6.openEuler-24.03-LTS(1.5.3):正常修复
7.openEuler-24.03-LTS-Next(1.5.3):正常修复

openeuler-ci-bot 修改了描述 5个月前

影响性分析说明:
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
openEuler评分: (评分和向量)
BaseScore:7.4 High
Vector:CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
受影响版本排查(受影响/不受影响):
1.master(1.5.3):受影响
2.openEuler-20.03-LTS-SP4(1.4.0):受影响
3.openEuler-22.03-LTS-SP1(1.5.2):受影响
4.openEuler-22.03-LTS-SP3(1.5.2):受影响
5.openEuler-22.03-LTS-SP4(1.5.2):受影响
6.openEuler-24.03-LTS(1.5.3):受影响
7.openEuler-24.03-LTS-Next(1.5.3):受影响
8.openEuler-24.03-LTS-SP1(1.5.3):受影响

修复是否涉及abi变化(是/否):
1.master(1.5.3):否
2.openEuler-20.03-LTS-SP4(1.4.0):否
3.openEuler-22.03-LTS-SP1(1.5.2):否
4.openEuler-22.03-LTS-SP3(1.5.2):否
5.openEuler-22.03-LTS-SP4(1.5.2):否
6.openEuler-24.03-LTS(1.5.3):否
7.openEuler-24.03-LTS-Next(1.5.3):否
8.openEuler-24.03-LTS-SP1(1.5.3):否

原因说明:
1.master(1.5.3):正常修复
2.openEuler-20.03-LTS-SP4(1.4.0):正常修复
3.openEuler-22.03-LTS-SP1(1.5.2):正常修复
4.openEuler-22.03-LTS-SP3(1.5.2):正常修复
5.openEuler-22.03-LTS-SP4(1.5.2):正常修复
6.openEuler-24.03-LTS(1.5.3):正常修复
7.openEuler-24.03-LTS-Next(1.5.3):正常修复
8.openEuler-24.03-LTS-SP1(1.5.3):正常修复

openeuler-ci-bot 修改了描述 5个月前

@ 经过 cve-manager 解析, 已分析的内容如下表所示:

状态 分析项目 内容
已分析 1.影响性分析说明 A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
已分析 2.openEulerScore 7.4
已分析 3.openEulerVector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
已分析 4.受影响版本排查 master:受影响,openEuler-20.03-LTS-SP4:受影响,openEuler-22.03-LTS-SP1:受影响,openEuler-22.03-LTS-SP3:受影响,openEuler-22.03-LTS-SP4:受影响,openEuler-24.03-LTS:受影响,openEuler-24.03-LTS-Next:受影响,openEuler-24.03-LTS-SP1:受影响
已分析 5.是否涉及abi变化 master:否,openEuler-20.03-LTS-SP4:否,openEuler-22.03-LTS-SP1:否,openEuler-22.03-LTS-SP3:否,openEuler-22.03-LTS-SP4:否,openEuler-24.03-LTS:否,openEuler-24.03-LTS-Next:否,openEuler-24.03-LTS-SP1:否
已分析 6.原因说明 master:正常修复,openEuler-20.03-LTS-SP4:正常修复,openEuler-22.03-LTS-SP1:正常修复,openEuler-22.03-LTS-SP3:正常修复,openEuler-22.03-LTS-SP4:正常修复,openEuler-24.03-LTS:正常修复,openEuler-24.03-LTS-Next:正常修复,openEuler-24.03-LTS-SP1:正常修复

请确认分析内容的准确性, 确认无误后, 您可以进行后续步骤, 否则您可以继续分析.

openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 移除了
 
sig/sig-security-fac
标签
5个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 添加了
 
sig/sig-security-fac
标签
5个月前
openeuler-sync-bot 通过合并 Pull Request !124: [sync] PR-118: fix CVE-2024-10963任务状态待办的 修改为已完成 5个月前
openeuler-ci-bot 任务状态已完成 修改为待办的 5个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 移除了
 
sig/sig-security-fac
标签
5个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 添加了
 
sig/sig-security-fac
标签
5个月前
openeuler-sync-bot 通过合并 Pull Request !125: [sync] PR-118: fix CVE-2024-10963任务状态待办的 修改为已完成 5个月前
openeuler-ci-bot 任务状态已完成 修改为待办的 5个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 移除了
 
sig/sig-security-fac
标签
5个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 添加了
 
sig/sig-security-fac
标签
5个月前
openeuler-sync-bot 通过合并 Pull Request !122: [sync] PR-119: fix CVE-2024-10963任务状态待办的 修改为已完成 5个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
5个月前
openeuler-ci-bot 移除了
 
sig/sig-security-fac
标签
5个月前
openeuler-ci-bot 添加了
 
CVE/FIXED
标签
5个月前
openeuler-ci-bot 添加了
 
sig/sig-security-fac
标签
5个月前
openeuler-ci-bot 计划开始日期2024-11-08 修改为2024-11-29 5个月前
openeuler-ci-bot 计划截止日期2024-12-08 修改为2024-12-13 5个月前
openeuler-ci-bot 优先级次要 修改为主要 5个月前
openeuler-ci-bot 负责人设置为gwei3 5个月前
openeuler-ci-bot 修改了描述 5个月前
openeuler-ci-bot 修改了描述 5个月前

登录 后才可以发表评论

状态
负责人
项目
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
里程碑
分支
参与者(5)
5329419 openeuler ci bot 1632792936 albatross-jade_t houmingyong-houmingyong like-pangzihapipangzi 木得感情的openEuler机器人-shinwell_hu
1
https://gitee.com/src-openeuler/pam.git
git@gitee.com:src-openeuler/pam.git
src-openeuler
pam
pam

搜索帮助