SCIENTIFIC-LINUX-ERRATA Archives

November 2010

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Connie Sieh <[log in to unmask]>
Reply To:
Connie Sieh <[log in to unmask]>
Date:
Wed, 3 Nov 2010 15:30:48 -0500
Content-Type:
TEXT/PLAIN
Parts/Attachments:
TEXT/PLAIN (41 lines)
Synopsis:          Moderate: pam security update
Issue date: 2010-11-01
CVE Names: CVE-2010-3316
  CVE-2010-3435
  CVE-2010-3853

It was discovered that the pam_namespace module executed the external
script namespace.init with an unchanged environment inherited from an
application calling PAM. In cases where such an environment was untrusted
(for example, when pam_namespace was configured for setuid applications
such as su or sudo), a local, unprivileged user could possibly use this
flaw to escalate their privileges. (CVE-2010-3853)

It was discovered that the pam_mail module used root privileges while
accessing users' files. In certain configurations, a local, unprivileged
user could use this flaw to obtain limited information about files or
directories that they do not have access to. (CVE-2010-3435)

It was discovered that the pam_xauth module did not verify the return
values of the setuid() and setgid() system calls. A local, unprivileged
user could use this flaw to execute the xauth command with root privileges
and make it read an arbitrary input file. (CVE-2010-3316)

SL 5.x

SRPMS:
  pam-0.99.6.2-6.el5_5.2.src.rpm

i386:
  pam-0.99.6.2-6.el5_5.2.i386.rpm
  pam-devel-0.99.6.2-6.el5_5.2.i386.rpm

x86_64:
  pam-0.99.6.2-6.el5_5.2.i386.rpm
  pam-0.99.6.2-6.el5_5.2.x86_64.rpm
  pam-devel-0.99.6.2-6.el5_5.2.i386.rpm
  pam-devel-0.99.6.2-6.el5_5.2.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2