{"id":"AZL-52539","summary":"CVE-2024-10963 affecting package pam for versions less than 1.5.3-4","details":"A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.","modified":"2026-04-01T05:16:30.663779Z","published":"2024-11-07T16:15:17Z","upstream":["CVE-2024-10963"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10963"}],"affected":[{"package":{"name":"pam","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/pam"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.3-4"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-52539.json"}}],"schema_version":"1.7.5"}