Vulnerability Details : CVE-2024-22365
Potential exploit
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Vulnerability category: Denial of service
Products affected by CVE-2024-22365
- cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-22365
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-22365
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2024-02-14 |
References for CVE-2024-22365
-
http://www.openwall.com/lists/oss-security/2024/01/18/3
oss-security - pam: pam_namespace misses O_DIRECTORY flag in `protect_dir()` (CVE-2024-22365)Exploit;Mailing List;Patch;Release Notes
-
https://github.com/linux-pam/linux-pam
GitHub - linux-pam/linux-pam: Linux PAM (Pluggable Authentication Modules for Linux) projectProduct
-
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS si… · linux-pam/linux-pam@031bb5a · GitHubPatch
-
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
Release Linux-PAM 1.6.0 · linux-pam/linux-pam · GitHubRelease Notes
Jump to