Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32773 | The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream. |
Ubuntu USN |
USN-5825-1 | PAM vulnerability |
Ubuntu USN |
USN-5825-2 | PAM regressions |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 29 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-29T15:30:36.688Z
Reserved: 2022-04-01T00:00:00.000Z
Link: CVE-2022-28321
Updated: 2024-08-03T05:48:37.939Z
Status : Modified
Published: 2022-09-19T22:15:10.913
Modified: 2025-05-29T16:15:27.793
Link: CVE-2022-28321
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN