CVE-2010-4708
Publication date 24 January 2011
Last updated 24 July 2024
Ubuntu priority
The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.
Status
Package | Ubuntu Release | Status |
---|---|---|
pam | ||
Notes
mdeslaur
this changes default behaviour, after discussion with slangasek, we should not change this in stable releases. Patch has been reverted upstream, no consensus as of 2011-06-08 Let's ignore this for now, and change the default in the dev release when upstream decides to change.