Description
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2010-3832 | pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program. |
Ubuntu USN |
USN-1140-1 | PAM vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:26:12.299Z
Reserved: 2010-10-08T00:00:00.000Z
Link: CVE-2010-3853
No data.
Status : Deferred
Published: 2011-01-24T18:00:02.173
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-3853
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN