CVE-2010-3435

Publication date 24 January 2011

Last updated 24 July 2024


Ubuntu priority

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

Read the notes from the security team

Status

Package Ubuntu Release Status
pam 11.04 natty
Fixed 1.1.2-2ubuntu8.2
10.10 maverick
Fixed 1.1.1-4ubuntu2.2
10.04 LTS lucid
Fixed 1.1.1-2ubuntu5.2
9.10 karmic Ignored end of life
8.04 LTS hardy
Fixed 0.99.7.1-5ubuntu6.3
6.06 LTS dapper Ignored end of life

Notes


mdeslaur

All patched below are needed, only two first were included in 1.1.2, and second introduced CVE-2010-3430 and CVE-2010-3431, which is fixed by second patch.

References

Related Ubuntu Security Notices (USN)

Other references