It was discovered that the PAM pam_access module incorrectly parsed certain rules as hostnames. An attacker could possibly use this issue to spoof hostnames and bypass access restrictions.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libpam-modules", "binary_version": "1.5.3-5ubuntu5.5" }, { "binary_name": "libpam-modules-bin", "binary_version": "1.5.3-5ubuntu5.5" }, { "binary_name": "libpam-runtime", "binary_version": "1.5.3-5ubuntu5.5" }, { "binary_name": "libpam0g", "binary_version": "1.5.3-5ubuntu5.5" }, { "binary_name": "libpam0g-dev", "binary_version": "1.5.3-5ubuntu5.5" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libpam-modules", "binary_version": "1.5.3-7ubuntu4.4" }, { "binary_name": "libpam-modules-bin", "binary_version": "1.5.3-7ubuntu4.4" }, { "binary_name": "libpam-runtime", "binary_version": "1.5.3-7ubuntu4.4" }, { "binary_name": "libpam0g", "binary_version": "1.5.3-7ubuntu4.4" }, { "binary_name": "libpam0g-dev", "binary_version": "1.5.3-7ubuntu4.4" } ] }