CVE-2022-28321

Summary

CVECVE-2022-28321
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-09-19 22:15:00 UTC
Updated2023-08-08 14:21:00 UTC
DescriptionThe Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.

Risk And Classification

Problem Types: CWE-287

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Linux-pam Linux-pam All All All All
Operating System Opensuse Tumbleweed - All All All

References

ReferenceSourceLinkTags
Bug 1197654 – VUL-0: CVE-2022-28321: pam: access denial bypass in pam_access.so MISC bugzilla.suse.com
Index of /source/distribution/openSUSE-current/repo/oss/src MISC download.opensuse.org
CVE-2022-28321 | SUSE MISC www.suse.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 199131 Ubuntu Security Notification for PAM Vulnerability (USN-5825-1)
  • 591406 Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)
  • 904831 Common Base Linux Mariner (CBL-Mariner) Security Update for pam (12406)
  • 905025 Common Base Linux Mariner (CBL-Mariner) Security Update for pam (12603)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report