{"id":"ALPINE-CVE-2024-22365","details":"linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.","modified":"2025-12-03T22:55:16.172696Z","published":"2024-02-06T08:15:52.203Z","upstream":["CVE-2024-22365"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2024-22365"}],"affected":[{"package":{"name":"linux-pam","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/linux-pam?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.0-r0"}]}],"versions":["1.1.3-r0","1.1.3-r1","1.1.3-r2","1.1.3-r3","1.1.3-r4","1.1.5-r0","1.1.6-r0","1.1.8-r0","1.1.8-r1","1.1.8-r2","1.2.0-r0","1.2.1-r0","1.2.1-r1","1.3.0-r0","1.3.0-r1","1.3.1-r0","1.3.1-r1","1.3.1-r2","1.3.1-r3","1.3.1-r4","1.4.0-r0","1.4.0-r1","1.5.1-r0","1.5.1-r1","1.5.2-r0","1.5.2-r1","1.5.2-r10","1.5.2-r2","1.5.2-r3","1.5.2-r4","1.5.2-r5","1.5.2-r6","1.5.2-r7","1.5.2-r8","1.5.2-r9","1.5.3-r0","1.5.3-r1","1.5.3-r2","1.5.3-r3","1.5.3-r4","1.5.3-r5","1.5.3-r6","1.5.3-r7","1.5.3-r8"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2024-22365.json"}},{"package":{"name":"linux-pam","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/linux-pam?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.0-r0"}]}],"versions":["1.1.3-r0","1.1.3-r1","1.1.3-r2","1.1.3-r3","1.1.3-r4","1.1.5-r0","1.1.6-r0","1.1.8-r0","1.1.8-r1","1.1.8-r2","1.2.0-r0","1.2.1-r0","1.2.1-r1","1.3.0-r0","1.3.0-r1","1.3.1-r0","1.3.1-r1","1.3.1-r2","1.3.1-r3","1.3.1-r4","1.4.0-r0","1.4.0-r1","1.5.1-r0","1.5.1-r1","1.5.2-r0","1.5.2-r1","1.5.2-r10","1.5.2-r2","1.5.2-r3","1.5.2-r4","1.5.2-r5","1.5.2-r6","1.5.2-r7","1.5.2-r8","1.5.2-r9","1.5.3-r0","1.5.3-r1","1.5.3-r2","1.5.3-r3","1.5.3-r4","1.5.3-r5","1.5.3-r6","1.5.3-r7","1.5.3-r8"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2024-22365.json"}},{"package":{"name":"linux-pam","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/linux-pam?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.0-r0"}]}],"versions":["1.1.3-r0","1.1.3-r1","1.1.3-r2","1.1.3-r3","1.1.3-r4","1.1.5-r0","1.1.6-r0","1.1.8-r0","1.1.8-r1","1.1.8-r2","1.2.0-r0","1.2.1-r0","1.2.1-r1","1.3.0-r0","1.3.0-r1","1.3.1-r0","1.3.1-r1","1.3.1-r2","1.3.1-r3","1.3.1-r4","1.4.0-r0","1.4.0-r1","1.5.1-r0","1.5.1-r1","1.5.2-r0","1.5.2-r1","1.5.2-r10","1.5.2-r2","1.5.2-r3","1.5.2-r4","1.5.2-r5","1.5.2-r6","1.5.2-r7","1.5.2-r8","1.5.2-r9","1.5.3-r0","1.5.3-r1","1.5.3-r2","1.5.3-r3","1.5.3-r4","1.5.3-r5","1.5.3-r6","1.5.3-r7","1.5.3-r8"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2024-22365.json"}},{"package":{"name":"linux-pam","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/linux-pam?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.0-r0"}]}],"versions":["1.1.3-r0","1.1.3-r1","1.1.3-r2","1.1.3-r3","1.1.3-r4","1.1.5-r0","1.1.6-r0","1.1.8-r0","1.1.8-r1","1.1.8-r2","1.2.0-r0","1.2.1-r0","1.2.1-r1","1.3.0-r0","1.3.0-r1","1.3.1-r0","1.3.1-r1","1.3.1-r2","1.3.1-r3","1.3.1-r4","1.4.0-r0","1.4.0-r1","1.5.1-r0","1.5.1-r1","1.5.2-r0","1.5.2-r1","1.5.2-r10","1.5.2-r2","1.5.2-r3","1.5.2-r4","1.5.2-r5","1.5.2-r6","1.5.2-r7","1.5.2-r8","1.5.2-r9","1.5.3-r0","1.5.3-r1","1.5.3-r2","1.5.3-r3","1.5.3-r4","1.5.3-r5","1.5.3-r6","1.5.3-r7","1.5.3-r8"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2024-22365.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}