vulnerability
Rocky Linux: CVE-2024-10963: pam (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:N) | Dec 19, 2024 | Feb 5, 2026 | Feb 9, 2026 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:N)
Published
Dec 19, 2024
Added
Feb 5, 2026
Modified
Feb 9, 2026
Description
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
Solutions
rocky-upgrade-pamrocky-upgrade-pam-debuginforocky-upgrade-pam-debugsourcerocky-upgrade-pam-develrocky-upgrade-pam-docs
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.