UBUNTU-CVE-2022-28321

Source
https://ubuntu.com/security/CVE-2022-28321
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-28321.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-28321
Upstream
Downstream
Related
Published
2022-09-19T22:15:00Z
Modified
2026-04-22T13:21:22.153906Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - negligible
Summary
[none]
Details

The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.

References

Affected packages

Ubuntu:Pro:14.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam@1.1.8-1ubuntu2.2+esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.8-1ubuntu2.2+esm1

Affected versions

1.*
1.1.3-8ubuntu3
1.1.3-10ubuntu1
1.1.3-11ubuntu1
1.1.8-1ubuntu1
1.1.8-1ubuntu2
1.1.8-1ubuntu2.1
1.1.8-1ubuntu2.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.1.8-1ubuntu2.2+esm1",
            "binary_name": "libpam-cracklib"
        },
        {
            "binary_version": "1.1.8-1ubuntu2.2+esm1",
            "binary_name": "libpam-modules"
        },
        {
            "binary_version": "1.1.8-1ubuntu2.2+esm1",
            "binary_name": "libpam-modules-bin"
        },
        {
            "binary_version": "1.1.8-1ubuntu2.2+esm1",
            "binary_name": "libpam-runtime"
        },
        {
            "binary_version": "1.1.8-1ubuntu2.2+esm1",
            "binary_name": "libpam0g"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-28321.json"

Ubuntu:Pro:16.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam@1.1.8-3.2ubuntu2.3+esm2?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.8-3.2ubuntu2.3+esm2

Affected versions

1.*
1.1.8-3.1ubuntu3
1.1.8-3.2ubuntu2
1.1.8-3.2ubuntu2.1
1.1.8-3.2ubuntu2.3
1.1.8-3.2ubuntu2.3+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.1.8-3.2ubuntu2.3+esm2",
            "binary_name": "libpam-cracklib"
        },
        {
            "binary_version": "1.1.8-3.2ubuntu2.3+esm2",
            "binary_name": "libpam-modules"
        },
        {
            "binary_version": "1.1.8-3.2ubuntu2.3+esm2",
            "binary_name": "libpam-modules-bin"
        },
        {
            "binary_version": "1.1.8-3.2ubuntu2.3+esm2",
            "binary_name": "libpam-runtime"
        },
        {
            "binary_version": "1.1.8-3.2ubuntu2.3+esm2",
            "binary_name": "libpam0g"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-28321.json"

Ubuntu:18.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam@1.1.8-3.6ubuntu2.18.04.4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.8-3.6ubuntu2.18.04.4

Affected versions

1.*
1.1.8-3.2ubuntu3
1.1.8-3.2ubuntu4
1.1.8-3.6ubuntu1
1.1.8-3.6ubuntu2
1.1.8-3.6ubuntu2.18.04.1
1.1.8-3.6ubuntu2.18.04.2
1.1.8-3.6ubuntu2.18.04.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.1.8-3.6ubuntu2.18.04.4",
            "binary_name": "libpam-cracklib"
        },
        {
            "binary_version": "1.1.8-3.6ubuntu2.18.04.4",
            "binary_name": "libpam-modules"
        },
        {
            "binary_version": "1.1.8-3.6ubuntu2.18.04.4",
            "binary_name": "libpam-modules-bin"
        },
        {
            "binary_version": "1.1.8-3.6ubuntu2.18.04.4",
            "binary_name": "libpam-runtime"
        },
        {
            "binary_version": "1.1.8-3.6ubuntu2.18.04.4",
            "binary_name": "libpam0g"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-28321.json"

Ubuntu:20.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam@1.3.1-5ubuntu4.4?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.1-5ubuntu4.4

Affected versions

1.*
1.3.1-5ubuntu1
1.3.1-5ubuntu3
1.3.1-5ubuntu4
1.3.1-5ubuntu4.1
1.3.1-5ubuntu4.2
1.3.1-5ubuntu4.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.3.1-5ubuntu4.4",
            "binary_name": "libpam-cracklib"
        },
        {
            "binary_version": "1.3.1-5ubuntu4.4",
            "binary_name": "libpam-modules"
        },
        {
            "binary_version": "1.3.1-5ubuntu4.4",
            "binary_name": "libpam-modules-bin"
        },
        {
            "binary_version": "1.3.1-5ubuntu4.4",
            "binary_name": "libpam-runtime"
        },
        {
            "binary_version": "1.3.1-5ubuntu4.4",
            "binary_name": "libpam0g"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-28321.json"

Ubuntu:22.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam@1.4.0-11ubuntu2.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.0-11ubuntu2.1

Affected versions

1.*
1.3.1-5ubuntu11
1.4.0-10ubuntu1
1.4.0-10ubuntu2
1.4.0-11ubuntu1
1.4.0-11ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.0-11ubuntu2.1",
            "binary_name": "libpam-cracklib"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.1",
            "binary_name": "libpam-modules"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.1",
            "binary_name": "libpam-modules-bin"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.1",
            "binary_name": "libpam-runtime"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.1",
            "binary_name": "libpam0g"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-28321.json"