CVE-2024-10041

Updated: 2025-08-20 03:12:31.629253

Description:

A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0.0
CVSS Version 3.x MEDIUM 4.7

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU pam 1.5.1 4.7 MEDIUM Ignored 2024-11-06 11:55:54 Deprioritize this CVE because it is a local-only, high‑complexity speculative‑execution side cha...
CentOS 7 ELS pam 1.1.8 4.7 MEDIUM Released CLSA-2025:1749571728 2025-06-30 02:11:56
CentOS 8.4 ELS pam 1.3.1 4.7 MEDIUM Ignored 2024-11-27 11:56:46 Ignored due to low severity
CentOS 8.5 ELS pam 1.3.1 4.7 MEDIUM Ignored 2024-11-27 11:56:44 Ignored due to low severity
CentOS Stream 8 ELS pam 1.3.1 4.7 MEDIUM Ignored 2024-11-27 11:56:50 Ignored due to low severity
CloudLinux 7 ELS pam 1.1.8 4.7 MEDIUM Released CLSA-2025:1749825017 2025-06-30 02:11:55
Oracle Linux 7 ELS pam 1.1.8 4.7 MEDIUM Released CLSA-2025:1749571114 2025-06-11 01:01:03
RHEL 7 ELS pam 1.1.8 4.7 MEDIUM Released CLSA-2025:1749570465 2025-06-11 00:56:03