{
  "threat_severity" : "Moderate",
  "public_date" : "2024-01-18T00:00:00Z",
  "bugzilla" : {
    "description" : "pam: allowing unprivileged user to block another user namespace",
    "id" : "2257722",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2257722"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-277",
  "details" : [ "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.", "A vulnerability was found in Linux PAM. An unprivileged user that is not yet in a corresponding mount namespace with ~/tmp mounted as a polyinstantiated dir can place a FIFO there, and a subsequent attempt to login as this user with `pam_namespace` configured will cause the `openat()` in `protect_dir()` to block the attempt, causing a local denial of service." ],
  "statement" : "Red Hat rates this as Moderate, as this vulnerability needs a non-default configuration in order to be explored by a malicious user. Also, the attack is local and the Denial of Service happens to a single user.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3163",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "pam-0:1.3.1-33.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2438",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "pam-0:1.5.1-19.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2438",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "pam-0:1.5.1-19.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "pam",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-22365\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-22365\nhttps://www.openwall.com/lists/oss-security/2024/01/18/3" ],
  "name" : "CVE-2024-22365",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}