CVE-2010-3853

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-01-24 18:00

Updated : 2023-12-10 11:03


NVD link : CVE-2010-3853

Mitre link : CVE-2010-3853

CVE.ORG link : CVE-2010-3853


JSON object : View

Products Affected

linux-pam

  • linux-pam