linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
The product does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.
Link | Tags |
---|---|
https://github.com/linux-pam/linux-pam | product |
http://www.openwall.com/lists/oss-security/2024/01/18/3 | exploit patch release notes mailing list |
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0 | release notes |
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb | patch |