CVE-2025-6020
- EPSS 0.03%
- Published 17.06.2025 12:44:08
- Last modified 23.09.2025 20:15:33
A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
CVE-2024-10963
- EPSS 0.28%
- Published 07.11.2024 16:15:17
- Last modified 06.02.2025 06:15:29
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue...
CVE-2024-10041
- EPSS 0.03%
- Published 23.10.2024 14:15:03
- Last modified 18.12.2024 10:15:05
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predicto...
CVE-2024-22365
- EPSS 0.07%
- Published 06.02.2024 08:15:52
- Last modified 05.06.2025 17:15:27
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
CVE-2022-28321
- EPSS 0.11%
- Published 19.09.2022 22:15:10
- Last modified 29.05.2025 16:15:27
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In suc...
- EPSS 0.44%
- Published 18.12.2020 00:15:14
- Last modified 21.11.2024 05:21:49
A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.
CVE-2015-3238
- EPSS 3.61%
- Published 24.08.2015 14:59:04
- Last modified 12.04.2025 10:46:40
The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
CVE-2014-2583
- EPSS 0.69%
- Published 10.04.2014 20:29:20
- Last modified 12.04.2025 10:46:40
Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to t...
CVE-2011-3148
- EPSS 0.16%
- Published 22.07.2012 17:55:01
- Last modified 11.04.2025 00:51:21
Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces ...
CVE-2011-3149
- EPSS 0.06%
- Published 22.07.2012 17:55:01
- Last modified 11.04.2025 00:51:21
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consu...