First published: Wed Jan 10 2024(Updated: )
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux-pam Linux-pam | <1.6.0 | |
debian/pam | <=1.3.1-5<=1.4.0-9+deb11u1<=1.5.2-6+deb12u1<=1.5.2-9.1 | 1.5.3-7 |
ubuntu/pam | <1.1.8-3.6ubuntu2.18.04.6+ | 1.1.8-3.6ubuntu2.18.04.6+ |
ubuntu/pam | <1.3.1-5ubuntu4.7 | 1.3.1-5ubuntu4.7 |
ubuntu/pam | <1.4.0-11ubuntu2.4 | 1.4.0-11ubuntu2.4 |
ubuntu/pam | <1.5.2-5ubuntu1.1 | 1.5.2-5ubuntu1.1 |
ubuntu/pam | <1.5.2-6ubuntu1.1 | 1.5.2-6ubuntu1.1 |
ubuntu/pam | <1.1.8-1ubuntu2.2+ | 1.1.8-1ubuntu2.2+ |
ubuntu/pam | <1.1.8-3.2ubuntu2.3+ | 1.1.8-3.2ubuntu2.3+ |
redhat/pam | <1.6.0 | 1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.