CVE-2010-4708
Publication date 24 January 2011
Last updated 24 July 2024
Ubuntu priority
The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user’s home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.
Status
Package | Ubuntu Release | Status |
---|---|---|
pam | 11.04 natty | Ignored end of life |
10.10 maverick | Ignored end of life | |
10.04 LTS lucid | Ignored end of life | |
9.10 karmic | Ignored end of life | |
8.04 LTS hardy | Ignored end of life | |
6.06 LTS dapper | Ignored end of life |
Notes
mdeslaur
this changes default behaviour, after discussion with slangasek, we should not change this in stable releases. Patch has been reverted upstream, no consensus as of 2011-06-08 Let’s ignore this for now, and change the default in the dev release when upstream decides to change.