Summary: | <sys-libs/pam-1.1.5 multiple vulnerabilities (CVE-2011-{3148,3149}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sean Amoss (RETIRED) <ackle> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | pam-bugs+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/46583/ | ||
Whiteboard: | A1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sean Amoss (RETIRED)
2011-10-25 11:01:41 UTC
1.1.5 in tree. Thanks Diego. Arches, please test and mark stable: =sys-libs/pam-1.1.5 target KEYWORDS : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" amd64 ok amd64: Ok amd64 done. Thanks Agostino and Tomas Stable for HPPA. Builds fine on x86. Was able to login again. Seems ok to me. Please mark stable for x86. alpha/arm/ia64/m68k/s390/sh/sparc/x86 stable ppc done ppc64 stable, last arch done Thanks everyone. Added to existing GLSA request. This issue was resolved and addressed in GLSA 201206-31 at http://security.gentoo.org/glsa/glsa-201206-31.xml by GLSA coordinator Stefan Behte (craig). CVE-2011-3149 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3149): The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption). CVE-2011-3148 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3148): Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file. |