First published: Wed Jan 10 2024(Updated: )
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pam | <=1.3.1-5<=1.4.0-9+deb11u1<=1.5.2-6+deb12u1<=1.5.2-9.1 | 1.5.3-7 |
ubuntu/pam | <1.1.8-3.6ubuntu2.18.04.6+ | 1.1.8-3.6ubuntu2.18.04.6+ |
ubuntu/pam | <1.3.1-5ubuntu4.7 | 1.3.1-5ubuntu4.7 |
ubuntu/pam | <1.4.0-11ubuntu2.4 | 1.4.0-11ubuntu2.4 |
ubuntu/pam | <1.5.2-5ubuntu1.1 | 1.5.2-5ubuntu1.1 |
ubuntu/pam | <1.5.2-6ubuntu1.1 | 1.5.2-6ubuntu1.1 |
ubuntu/pam | <1.1.8-1ubuntu2.2+ | 1.1.8-1ubuntu2.2+ |
ubuntu/pam | <1.1.8-3.2ubuntu2.3+ | 1.1.8-3.2ubuntu2.3+ |
redhat/pam | <1.6.0 | 1.6.0 |
IBM MQ | <=CD: v3.0.0, v3.0.1, v3.1.0 - 3.1.3 LTS: v2.0.0 - 2.0.22 Other Release: v2.4.0 - v2.4.8, v2.3.0 - 2.3.3, v2.2.0 - v2.2.2 | |
IBM MQ Advanced | <=CD: 9.3.4.0-r1, 9.3.4.1-r1,9.3.5.0-r1,9.3.5.0-r2,9.3.5.1-r1, 9.3.5.1-r2LTS: 9.2.0.1-r1-eus, 9.2.0.2-r1-eus, 9.2.0.2-r2-eus, 9.2.0.4-r1-eus, 9.2.0.5-r1-eus, 9.2.0.5-r2-eus, 9.2.0.5-r3-eus, 9.2.0.6-r1-eus, 9.2.0.6-r2-eus, 9.2.0.6-r3-eus, 9.2.3.0-r1, 9.2.4.0-r1, 9.2.5.0-r1, 9.2.5.0-r2, 9.2.5.0-r3, 9.3.0.0-r1, 9.3.0.0-r2, 9.3.0.0-r3, 9.3.0.1-r1, 9.3.0.1-r2, 9.3.0.1-r3, 9.3.0.1-r4, 9.3.0.3-r1, 9.3.0.4-r1, 9.3.0.4-r2, 9.3.0.5-r1, 9.3.0.5-r2, 9.3.0.5-r3, 9.3.0.6-r1, 9.3.0.10-r1, 9.3.0.10-r2, 9.3.0.11-r1,9.3.0.11-r2, 9.3.0.15-r1, 9.3.0.16-r1, 9.3.0.16-r2, 9.3.0.17-r1, 9.3.0.17-r2 Other Release: 9.2.0.1-r1-eus, 9.2.0.2-r1-eus, 9.2.0.2-r2-eus, 9.2.0.4-r1-eus, 9.2.0.5-r1-eus, 9.2.0.5-r2-eus, 9.2.0.5-r3-eus, 9.2.0.6-r1-eus, 9.2.0.6-r2-eus, 9.2.0.6-r3-eus, 9.2.3.0-r1, 9.2.4.0-r1, 9.2.5.0-r1, 9.2.5.0-r2, 9.2.5.0-r3, 9.3.0.0-r1, 9.3.0.0-r2, 9.3.0.0-r3, 9.3.0.1-r1, 9.3.0.1-r2, 9.3.0.1-r3, 9.3.0.1-r4, 9.3.0.3-r1, 9.3.0.4-r1, 9.3.0.4-r2, 9.3.0.5-r1, 9.3.0.5-r2, 9.3.0.5-r3, 9.3.0.6-r1, 9.3.1.0-r1, 9.3.1.0-r2, 9.3.1.0-r3, 9.3.1.1-r1, 9.3.2.0-r1, 9.3.2.0-r2, 9.3.2.1-r1, 9.3.2.1-r2, 9.3.3.0-r1, 9.3.3.0-r2, 9.3.3.1-r1, 9.3.3.1-r2, 9.3.3.2-r1, 9.3.3.2-r2, 9.3.3.2-r3, ,9.3.3.3-r1, 9.3.3.3-r2 | |
SUSE PAM | <1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22365 has a severity rating that indicates a potential denial of service vulnerability that affects login processes.
To fix CVE-2024-22365, upgrade to Linux PAM version 1.6.0 or later.
Linux PAM versions before 1.6.0 are affected by CVE-2024-22365.
CVE-2024-22365 enables attackers to cause a denial of service by blocking the login process.
Currently, there are no known workarounds for CVE-2024-22365, so upgrading is recommended.