The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and previous versions does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux-pam linux-pam 0.99.1.0 |
||
linux-pam linux-pam 0.99.2.0 |
||
linux-pam linux-pam 0.99.2.1 |
||
linux-pam linux-pam 0.99.3.0 |
||
linux-pam linux-pam 0.99.4.0 |
||
linux-pam linux-pam 0.99.5.0 |
||
linux-pam linux-pam 0.99.6.0 |
||
linux-pam linux-pam 0.99.6.1 |
||
linux-pam linux-pam 0.99.6.2 |
||
linux-pam linux-pam 0.99.6.3 |
||
linux-pam linux-pam 0.99.7.0 |
||
linux-pam linux-pam 0.99.7.1 |
||
linux-pam linux-pam 0.99.8.0 |
||
linux-pam linux-pam 0.99.8.1 |
||
linux-pam linux-pam 0.99.9.0 |
||
linux-pam linux-pam 0.99.10.0 |
||
linux-pam linux-pam 1.0.0 |
||
linux-pam linux-pam 1.0.1 |
||
linux-pam linux-pam 1.0.2 |
||
linux-pam linux-pam 1.0.3 |
||
linux-pam linux-pam 1.0.4 |
||
linux-pam linux-pam 1.1.0 |
||
linux-pam linux-pam 1.1.1 |
||
linux-pam linux-pam |