Control: tags -1 + fixed-upstream

Hi,

On Fri, Oct 25, 2024 at 02:59:24PM +0200, Moritz Mühlenhoff wrote:
> Source: pam
> X-Debbugs-CC: t...@security.debian.org
> Severity: normal
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for pam.
> 
> CVE-2024-10041[0]:
> | A vulnerability was found in PAM. The secret information is stored
> | in memory, where the attacker can trigger the victim program to
> | execute by sending characters to its standard input (stdin). As this
> | occurs, the attacker can train the branch predictor to execute an
> | ROP chain speculatively. This flaw could result in leaked passwords,
> | such as those found in /etc/shadow while performing authentications.
> 
> This appeared via Red Hat bugzilla and the currently only public
> reference is  https://bugzilla.redhat.com/show_bug.cgi?id=2319212
> 
> To me it sounds rather like hardening than an actual security
> vulnerability, but it's hard to tell with the information available
> so far.

For reference, upstream commented on the question in
https://github.com/linux-pam/linux-pam/issues/846, quoting:

| My understanding of the matter is that, starting with #686
| (which was merged before Linux-PAM v1.6.0), Linux-PAM is not affected.

So this should be covered by
https://github.com/linux-pam/linux-pam/pull/686 .

Regards,
Salvatore

Reply via email to