pam-1.3.1-33.el8

エラータID: AXSA:2024-8171:02

Release date: 
Friday, June 14, 2024 - 20:13
Subject: 
pam-1.3.1-33.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.

Security Fix(es):

* pam: allowing unprivileged user to block another user namespace (CVE-2024-22365)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 8.10 Release Notes linked from the References section.

CVE-2024-22365
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. pam-1.3.1-33.el8.src.rpm
    MD5: ca4d7e6be06a5376423b357464e48059
    SHA-256: b3f2466209ba0eed01e58b31c2a6b177dccc167bdb5d0f9405c55db1e4522890
    Size: 1.10 MB

Asianux Server 8 for x86_64
  1. pam-1.3.1-33.el8.i686.rpm
    MD5: 6d077d902faa1b0aac3969f161d827b4
    SHA-256: acf1928b82da96fce57a7179707b8fcc8f671b04e88356ebb127ac2130b3be07
    Size: 766.03 kB
  2. pam-1.3.1-33.el8.x86_64.rpm
    MD5: f10bd195066a93294223c74333d93bc9
    SHA-256: dd9813ba97e2a6e645ad7005a25638dad55600d2e1163105172affd99f4d2406
    Size: 745.33 kB
  3. pam-devel-1.3.1-33.el8.i686.rpm
    MD5: 81f84c9fdca783246ff5a7ce73484ed7
    SHA-256: 302ddd206749e3f283b342f5a9feeac993e4d1e6be4f0d899136b6a97aedfbc9
    Size: 210.50 kB
  4. pam-devel-1.3.1-33.el8.x86_64.rpm
    MD5: 9e96e14e93fb9c96d28946fe856b944e
    SHA-256: f786dd27603e31c6da1afaaed0358a634611135086c3cf506fca9436876b0a49
    Size: 210.49 kB