Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 942075 (CVE-2024-10041) - <sys-libs/pam-1.7.0_p20241230: password leakage via speculative ROP chain
Summary: <sys-libs/pam-1.7.0_p20241230: password leakage via speculative ROP chain
Status: IN_PROGRESS
Alias: CVE-2024-10041
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: A1 [stable?]
Keywords:
Depends on: 913087
Blocks:
  Show dependency tree
 
Reported: 2024-10-24 13:05 UTC by Christopher Fore
Modified: 2025-01-08 04:56 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-10-24 13:05:05 UTC
CVE-2024-10041:

A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.


Note: If SELinux is set to Enforcing mode then this vulnerability is mitigated.



There isn't a fixed version mentioned in the RHSA nor the bugzilla report, so setting whiteboard to upstream/ebuild for now. Upstream did release 1.7.0 today, however, so it might be fixed in that?
Comment 1 Larry the Git Cow gentoo-dev 2025-01-08 04:56:16 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=eb07a754c3ef70e7165adb2e0800050d95dc10ee

commit eb07a754c3ef70e7165adb2e0800050d95dc10ee
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2025-01-08 04:15:54 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2025-01-08 04:55:44 +0000

    sys-libs/pam: add 1.7.0_p20241230
    
    * Switch to Meson
    * Wire up elogind+logind support (bug #931115) as it's now available
      upstream
    * Docs are hard-disabled for now, but that's sort of fine (enough) for now
      given that we had bug #913087 for the previous ebuild
    * Using a snapshot as there's a few build system patches post-tag and
      some other generally noteworthy patches we'd have to pull in manually
      otherwise
    * Wire up verify-sig for the next release (but not used for this ebuild
      as took a snapshot)
    
    Bug: https://bugs.gentoo.org/913087
    Bug: https://bugs.gentoo.org/942075
    Closes: https://bugs.gentoo.org/929970
    Closes: https://bugs.gentoo.org/925334
    Closes: https://bugs.gentoo.org/931115
    Signed-off-by: Sam James <sam@gentoo.org>

 sys-libs/pam/Manifest                   |   1 +
 sys-libs/pam/pam-1.7.0_p20241230.ebuild | 165 ++++++++++++++++++++++++++++++++
 2 files changed, 166 insertions(+)