CVE-2010-4708
Published: 24 January 2011
The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.
Notes
Author | Note |
---|---|
mdeslaur | this changes default behaviour, after discussion with slangasek, we should not change this in stable releases. Patch has been reverted upstream, no consensus as of 2011-06-08 Let's ignore this for now, and change the default in the dev release when upstream decides to change. |
Priority
Status
Package | Release | Status |
---|---|---|
pam Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8 upstream: http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23 upstream: http://git.fedorahosted.org/git/?p=linux-pam.git;a=commit;h=f4aba7f47b87984fda3c5533b03b08a85e4ce81b |