OESA-2025-1601

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1601
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1601.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-1601
Upstream
Published
2025-06-06T14:04:11Z
Modified
2025-09-03T06:31:09.634677Z
Summary
pam security update
Details

PAM (Pluggable Authentication Modules) is a system of libraries that handle the authentication tasks of applications (services) on the system.

Security Fix(es):

A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.(CVE-2024-10041)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS / pam

Package

Name
pam
Purl
pkg:rpm/openEuler/pam&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.3-8.oe2403

Ecosystem specific

{
    "aarch64": [
        "pam-1.5.3-8.oe2403.aarch64.rpm",
        "pam-debuginfo-1.5.3-8.oe2403.aarch64.rpm",
        "pam-debugsource-1.5.3-8.oe2403.aarch64.rpm",
        "pam-devel-1.5.3-8.oe2403.aarch64.rpm"
    ],
    "src": [
        "pam-1.5.3-8.oe2403.src.rpm"
    ],
    "x86_64": [
        "pam-1.5.3-8.oe2403.x86_64.rpm",
        "pam-debuginfo-1.5.3-8.oe2403.x86_64.rpm",
        "pam-debugsource-1.5.3-8.oe2403.x86_64.rpm",
        "pam-devel-1.5.3-8.oe2403.x86_64.rpm"
    ],
    "noarch": [
        "pam-help-1.5.3-8.oe2403.noarch.rpm"
    ]
}