CVE-2014-2583

Priority
Description
Multiple directory traversal vulnerabilities in pam_timestamp.c in the
pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to
create arbitrary files or possibly bypass authentication via a .. (dot dot)
in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value
to the check_tty function, which is used by the format_timestamp_name
function.
Assigned-to
mdeslaur
Notes
jdstrandUbuntu does not use pam_timestamp.so by default
Package
Source: pam (LP Ubuntu Debian)
Upstream:released (1.1.8-3.1)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.1.8-1ubuntu2.1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Patches:
Upstream:https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=9dcead87e6d7f66d34e7a56d11a30daca367dffb
More Information

Updated: 2020-03-18 22:19:53 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)