ALAS-2024-2435

Related Vulnerabilities: CVE-2024-22365  

A vulnerability was found in Linux PAM. An unprivileged user that is not yet in a corresponding mount namespace with ~/tmp mounted as a polyinstantiated dir can place a FIFO there, and a subsequent attempt to login as this user with `pam_namespace` configured will cause the `openat()` in `protect_dir()` to block the attempt, causing a local denial of service. (CVE-2024-22365)

ALAS-2024-2435


Amazon Linux 2 Security Advisory: ALAS-2024-2435
Advisory Release Date: 2024-02-01 19:57 Pacific
Advisory Updated Date: 2024-02-01 19:57 Pacific
Severity: Low

Issue Overview:

A vulnerability was found in Linux PAM. An unprivileged user that is not yet in a corresponding mount namespace with ~/tmp mounted as a polyinstantiated dir can place a FIFO there, and a subsequent attempt to login as this user with `pam_namespace` configured will cause the `openat()` in `protect_dir()` to block the attempt, causing a local denial of service. (CVE-2024-22365)


Affected Packages:

pam


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update pam to update your system.

New Packages:
aarch64:
    pam-1.1.8-23.amzn2.0.2.aarch64
    pam-devel-1.1.8-23.amzn2.0.2.aarch64
    pam-debuginfo-1.1.8-23.amzn2.0.2.aarch64

i686:
    pam-1.1.8-23.amzn2.0.2.i686
    pam-devel-1.1.8-23.amzn2.0.2.i686
    pam-debuginfo-1.1.8-23.amzn2.0.2.i686

src:
    pam-1.1.8-23.amzn2.0.2.src

x86_64:
    pam-1.1.8-23.amzn2.0.2.x86_64
    pam-devel-1.1.8-23.amzn2.0.2.x86_64
    pam-debuginfo-1.1.8-23.amzn2.0.2.x86_64