Bug 2319212 (CVE-2024-10041)
Summary: | CVE-2024-10041 pam: libpam: Libpam vulnerable to read hashed password | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | --- | |
Doc Text: |
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2328933 | ||
Bug Blocks: | |||
Deadline: | 2024-10-18 |
Description
OSIDB Bzimport
2024-10-16 15:23:48 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2024:9941 https://access.redhat.com/errata/RHSA-2024:9941 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10379 https://access.redhat.com/errata/RHSA-2024:10379 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:11250 https://access.redhat.com/errata/RHSA-2024:11250 |