UBUNTU-CVE-2024-10041

Source
https://ubuntu.com/security/CVE-2024-10041
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-10041.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-10041
Related
Published
2024-10-23T14:15:00Z
Modified
2024-12-18T16:37:07Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.

References

Affected packages

Ubuntu:Pro:14.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam?arch=src?distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.3-8ubuntu3
1.1.3-10ubuntu1
1.1.3-11ubuntu1
1.1.8-1ubuntu1
1.1.8-1ubuntu2
1.1.8-1ubuntu2.1
1.1.8-1ubuntu2.2
1.1.8-1ubuntu2.2+esm1
1.1.8-1ubuntu2.2+esm3
1.1.8-1ubuntu2.2+esm4

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:16.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.8-3.1ubuntu3
1.1.8-3.2ubuntu2
1.1.8-3.2ubuntu2.1
1.1.8-3.2ubuntu2.3
1.1.8-3.2ubuntu2.3+esm1
1.1.8-3.2ubuntu2.3+esm2
1.1.8-3.2ubuntu2.3+esm4
1.1.8-3.2ubuntu2.3+esm5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.8-3.2ubuntu3
1.1.8-3.2ubuntu4
1.1.8-3.6ubuntu1
1.1.8-3.6ubuntu2
1.1.8-3.6ubuntu2.18.04.1
1.1.8-3.6ubuntu2.18.04.2
1.1.8-3.6ubuntu2.18.04.3
1.1.8-3.6ubuntu2.18.04.4
1.1.8-3.6ubuntu2.18.04.6
1.1.8-3.6ubuntu2.18.04.6+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.1-5ubuntu1
1.3.1-5ubuntu3
1.3.1-5ubuntu4
1.3.1-5ubuntu4.1
1.3.1-5ubuntu4.2
1.3.1-5ubuntu4.3
1.3.1-5ubuntu4.4
1.3.1-5ubuntu4.6
1.3.1-5ubuntu4.7

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.1-5ubuntu11
1.4.0-10ubuntu1
1.4.0-10ubuntu2
1.4.0-11ubuntu1
1.4.0-11ubuntu2
1.4.0-11ubuntu2.1
1.4.0-11ubuntu2.3
1.4.0-11ubuntu2.4

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.5.3-5ubuntu5
1.5.3-7ubuntu1
1.5.3-7ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.5.2-6ubuntu1
1.5.2-9.1ubuntu1
1.5.2-9.1ubuntu2
1.5.2-9.1ubuntu3
1.5.3-5ubuntu3
1.5.3-5ubuntu4
1.5.3-5ubuntu5
1.5.3-5ubuntu5.1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}