Synopsis: Moderate: pam security update Issue date: 2010-11-01 CVE Names: CVE-2010-3316 CVE-2010-3435 CVE-2010-3853 It was discovered that the pam_namespace module executed the external script namespace.init with an unchanged environment inherited from an application calling PAM. In cases where such an environment was untrusted (for example, when pam_namespace was configured for setuid applications such as su or sudo), a local, unprivileged user could possibly use this flaw to escalate their privileges. (CVE-2010-3853) It was discovered that the pam_mail module used root privileges while accessing users' files. In certain configurations, a local, unprivileged user could use this flaw to obtain limited information about files or directories that they do not have access to. (CVE-2010-3435) It was discovered that the pam_xauth module did not verify the return values of the setuid() and setgid() system calls. A local, unprivileged user could use this flaw to execute the xauth command with root privileges and make it read an arbitrary input file. (CVE-2010-3316) SL 5.x SRPMS: pam-0.99.6.2-6.el5_5.2.src.rpm i386: pam-0.99.6.2-6.el5_5.2.i386.rpm pam-devel-0.99.6.2-6.el5_5.2.i386.rpm x86_64: pam-0.99.6.2-6.el5_5.2.i386.rpm pam-0.99.6.2-6.el5_5.2.x86_64.rpm pam-devel-0.99.6.2-6.el5_5.2.i386.rpm pam-devel-0.99.6.2-6.el5_5.2.x86_64.rpm -Connie Sieh -Troy Dawson