PatchSiren cyber security CVE debrief
CVE-2024-22365 Linux Pam CVE debrief
CVE-2024-22365 is a medium-severity denial-of-service issue in linux-pam affecting versions before 1.6.0. According to the NVD record, a local attacker with low privileges can trigger a blocked login process through mkfifo-related behavior because an openat call used for protect_dir lacks O_DIRECTORY. The practical impact is availability loss for authentication and login workflows, not data exposure or integrity compromise.
- Vendor
- Linux Pam
- Product
- CVE-2024-22365
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-02-06
- Original CVE updated
- 2026-05-12
- Advisory published
- 2024-02-06
- Advisory updated
- 2026-05-12
Who should care
Administrators and security teams running linux-pam on Linux systems should care, especially where PAM is part of interactive login, privilege elevation, or remote access flows. Distribution maintainers and platform operators should also review whether their packaged linux-pam version is below 1.6.0 or whether the upstream patch has already been backported.
Technical summary
NVD lists linux-pam versions before 1.6.0 as vulnerable, with a CVSS 3.1 vector of AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The record states that an attacker can cause a denial of service by blocking the login process via mkfifo-related behavior, because the openat call for protect_dir does not use O_DIRECTORY. The NVD record also maps the weakness to CWE-664 as a secondary classification, while the primary weakness is listed as CWE-noinfo.
Defensive priority
Medium
Recommended defensive actions
- Confirm whether any deployed linux-pam packages are earlier than 1.6.0.
- Upgrade to linux-pam 1.6.0 or later where possible.
- If immediate upgrade is not feasible, apply the upstream patch or a vendor backport referenced in the advisory record.
- Review systems where PAM-mediated logins are operationally critical, since the main impact is blocked authentication and login availability.
- Validate that downstream distribution advisories or package changelogs reflect the fix before and after deployment.
Evidence notes
The supplied NVD record publishes CVE-2024-22365 on 2024-02-06 and last modified it on 2026-05-12. The record cites an oss-security mailing list post from 2024-01-18, an upstream linux-pam commit, and the v1.6.0 release tag as reference material. The affected version range in NVD ends before 1.6.0. NVD assigns CVSS 3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and lists the primary weakness as CWE-noinfo with CWE-664 as secondary.
Official resources
-
CVE-2024-22365 CVE record
CVE.org
-
CVE-2024-22365 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Mailing List, Patch, Release Notes
-
Source reference
[email protected] - Product
-
Mitigation or vendor reference
[email protected] - Patch
-
Mitigation or vendor reference
[email protected] - Release Notes
-
Source reference
af854a3a-2127-422b-91ae-364da2661108
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Publicly disclosed in the NVD record on 2024-02-06, with upstream patch and release references included in the source record.