CVE-2010-3430

NameCVE-2010-3430
DescriptionThe privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs599832

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pam (PTS)jessie1.1.8-3.1+deb8u2fixed
stretch1.1.8-3.6fixed
buster, bullseye, sid1.3.1-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pamsource(unstable)1.1.3-1599832
pamsourcelenny(not affected)
pamsourcesqueeze(not affected)

Notes

[squeeze] - pam <not-affected> (Affected functionality introduced in 1.1.2, see #599832)
[lenny] - pam <not-affected> (Affected functionality introduced in 1.1.2, see #599832)
20100924164823.GA21584@openwall.com

Search for package or bug name: Reporting problems