Описание
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 1.1.3-1ubuntu2 |
hardy | released | 0.99.7.1-5ubuntu6.3 |
karmic | ignored | end of life |
lucid | released | 1.1.1-2ubuntu5.2 |
maverick | released | 1.1.1-4ubuntu2.2 |
natty | released | 1.1.2-2ubuntu8.2 |
upstream | released | 1.1.3 |
Показывать по
6.9 Medium
CVSS2
Связанные уязвимости
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) bef ...
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
6.9 Medium
CVSS2