NA

CVE-2024-22365

Published: 06/02/2024 Updated: 14/02/2024
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

linux-pam (aka Linux PAM) prior to 1.6.0 allows malicious users to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux-pam linux-pam

Vendor Advisories

Debian Bug report logs - #1061097 pam: CVE-2024-22365: pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS situations Package: src:pam; Maintainer for src:pam is Sam Hartman <hartmans@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 18 Jan 2024 07:45:01 UTC Severity: import ...
A vulnerability was found in Linux PAM An unprivileged user that is not yet in a corresponding mount namespace with ~/tmp mounted as a polyinstantiated dir can place a FIFO there, and a subsequent attempt to login as this user with `pam_namespace` configured will cause the `openat()` in `protect_dir()` to block the attempt, causing a local denial ...