Synopsis: Moderate: pam security update Issue date: 2010-11-16 CVE Names: CVE-2010-3316 CVE-2010-3435 CVE-2010-3853 It was discovered that the pam_namespace module executed the external script namespace.init with an unchanged environment inherited from an application calling PAM. In cases where such an environment was untrusted (for example, when pam_namespace was configured for setuid applications such as su or sudo), a local, unprivileged user could possibly use this flaw to escalate their privileges. (CVE-2010-3853) It was discovered that the pam_env and pam_mail modules used root privileges while accessing user's files. A local, unprivileged user could use this flaw to obtain information, from the lines that have the KEY=VALUE format expected by pam_env, from an arbitrary file. Also, in certain configurations, a local, unprivileged user using a service for which the pam_mail module was configured for, could use this flaw to obtain limited information about files or directories that they do not have access to. (CVE-2010-3435) Note: As part of the fix for CVE-2010-3435, this update changes the default value of pam_env's configuration option user_readenv to 0, causing the module to not read user's ~/.pam_environment configuration file by default, as reading it may introduce unexpected changes to the environment of the service using PAM, or PAM modules consulted after pam_env. It was discovered that the pam_xauth module did not verify the return values of the setuid() and setgid() system calls. A local, unprivileged user could use this flaw to execute the xauth command with root privileges and make it read an arbitrary input file. (CVE-2010-3316) SL 6.x SRPMS: pam-1.1.1-4.el6_0.1.src.rpm i386: pam-1.1.1-4.el6_0.1.i686.rpm pam-devel-1.1.1-4.el6_0.1.i686.rpm x86_64: pam-1.1.1-4.el6_0.1.i686.rpm pam-1.1.1-4.el6_0.1.x86_64.rpm pam-devel-1.1.1-4.el6_0.1.i686.rpm pam-devel-1.1.1-4.el6_0.1.x86_64.rpm -Connie Sieh -Troy Dawson