Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-3435

Publication date 24 January 2011

Last updated 24 July 2024


Ubuntu priority

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

Read the notes from the security team

Status

Package Ubuntu Release Status
pam 11.04 natty
Fixed 1.1.2-2ubuntu8.2
10.10 maverick
Fixed 1.1.1-4ubuntu2.2
10.04 LTS lucid
Fixed 1.1.1-2ubuntu5.2
9.10 karmic Ignored
8.04 LTS hardy
Fixed 0.99.7.1-5ubuntu6.3
6.06 LTS dapper Ignored

Notes


mdeslaur

All patched below are needed, only two first were included in 1.1.2, and second introduced CVE-2010-3430 and CVE-2010-3431, which is fixed by second patch.

References

Related Ubuntu Security Notices (USN)

Other references