An improper input validation allows an unauthenticated attacker to obtain remote command execution to the afflicted PAM method by sending a specially crafted HTTP request. The vulnerability lets a destructive lower-privileged PAM user to complete server enhance associated actions. From the Linux kernel, the next vulnerability has been settled: drm/vc4: https://freemank913lpr0.shivawiki.com/user