First published: Wed Jan 17 2024(Updated: )
Matthias Gerstner discovered that the PAM pam_namespace module incorrectly handled special files when performing directory checks. A local attacker could possibly use this issue to cause PAM to stop responding, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpam-modules | <1.5.2-6ubuntu1.1 | 1.5.2-6ubuntu1.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libpam-modules | <1.5.2-5ubuntu1.1 | 1.5.2-5ubuntu1.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libpam-modules | <1.4.0-11ubuntu2.4 | 1.4.0-11ubuntu2.4 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libpam-modules | <1.3.1-5ubuntu4.7 | 1.3.1-5ubuntu4.7 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6588-1 is categorized as a potential denial of service vulnerability.
To fix USN-6588-1, update the libpam-modules package to the recommended version based on your Ubuntu release.
Affected versions in USN-6588-1 include libpam-modules versions up to 1.5.2-6ubuntu1.1 for Ubuntu 23.10, 1.5.2-5ubuntu1.1 for Ubuntu 23.04, and lower for earlier versions.
The issue leading to USN-6588-1 was discovered by Matthias Gerstner.
The primary component affected by the vulnerability in USN-6588-1 is the PAM pam_namespace module.