[CLSA-2024:1713333823] Fix CVE(s): CVE-2024-22365
Type:
security
Severity:
Moderate
Release date:
2024-04-17 06:03:45 UTC
Description:
* Backport 031bb5a5d0d950253b68138b498dc93be69a64cb: fix CVE-2024-22365 - debian/patches-applied/CVE-2024-22365.patch: pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS situations - CVE-2024-22365
Updated packages:
  • libpam-cracklib_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els1_amd64.deb
    sha:6a908d7516840f47159315047cf441910e523d51
  • libpam-doc_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els1_all.deb
    sha:6c6476791b5d334d131776144e118c791353101f
  • libpam-modules_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els1_amd64.deb
    sha:041b20056801feccdfe3f5d1a32c3235875bb858
  • libpam-modules-bin_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els1_amd64.deb
    sha:b9a6732418c7f7ca388492684eb69eb60b4830e7
  • libpam-runtime_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els1_all.deb
    sha:ed0fdf8a5096abd264a3d674c202ac2017132b4a
  • libpam0g_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els1_amd64.deb
    sha:7908b20bcb250793d49c884d036a623dba4e1cff
  • libpam0g-dev_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els1_amd64.deb
    sha:09b93ba1aac5d3a1fedbd0e56e93689b4847434c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.