CVE-2011-5054

NameCVE-2011-5054
Descriptionkcheckpass passes a user-supplied argument to the pam_start function, often within a setuid environment, which allows local users to invoke any configured PAM stack, and possibly trigger unintended side effects, via an arbitrary valid PAM service name, a different vulnerability than CVE-2011-4122. NOTE: the vendor indicates that the possibility of resultant privilege escalation may be "a bit far-fetched."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kdebase-workspacesource(unstable)(unfixed)unimportant

Notes

the kcheckpass utility is not present in sid (still present in src package, will check with KDE maints)
Not exploitable without OpenPAM

Search for package or bug name: Reporting problems