The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) prior to 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux-pam linux-pam 0.99.1.0 |
||
linux-pam linux-pam 0.99.2.0 |
||
linux-pam linux-pam 0.99.2.1 |
||
linux-pam linux-pam 0.99.3.0 |
||
linux-pam linux-pam 0.99.4.0 |
||
linux-pam linux-pam 0.99.5.0 |
||
linux-pam linux-pam 0.99.6.0 |
||
linux-pam linux-pam 0.99.6.1 |
||
linux-pam linux-pam 0.99.6.2 |
||
linux-pam linux-pam 0.99.6.3 |
||
linux-pam linux-pam 0.99.7.0 |
||
linux-pam linux-pam 0.99.7.1 |
||
linux-pam linux-pam 0.99.8.0 |
||
linux-pam linux-pam 0.99.8.1 |
||
linux-pam linux-pam 0.99.9.0 |
||
linux-pam linux-pam 0.99.10.0 |
||
linux-pam linux-pam 1.0.0 |
||
linux-pam linux-pam 1.0.1 |
||
linux-pam linux-pam 1.0.2 |
||
linux-pam linux-pam 1.0.3 |
||
linux-pam linux-pam 1.0.4 |
||
linux-pam linux-pam 1.1.0 |
||
linux-pam linux-pam |