CVE-2010-3316

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.3 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
VendorProductVersion
linux-pamlinux-pam
𝑥
≤ 1.1.1
linux-pamlinux-pam
0.99.1.0
linux-pamlinux-pam
0.99.2.0
linux-pamlinux-pam
0.99.2.1
linux-pamlinux-pam
0.99.3.0
linux-pamlinux-pam
0.99.4.0
linux-pamlinux-pam
0.99.5.0
linux-pamlinux-pam
0.99.6.0
linux-pamlinux-pam
0.99.6.1
linux-pamlinux-pam
0.99.6.2
linux-pamlinux-pam
0.99.6.3
linux-pamlinux-pam
0.99.7.0
linux-pamlinux-pam
0.99.7.1
linux-pamlinux-pam
0.99.8.0
linux-pamlinux-pam
0.99.8.1
linux-pamlinux-pam
0.99.9.0
linux-pamlinux-pam
0.99.10.0
linux-pamlinux-pam
1.0.0
linux-pamlinux-pam
1.0.1
linux-pamlinux-pam
1.0.2
linux-pamlinux-pam
1.0.3
linux-pamlinux-pam
1.0.4
linux-pamlinux-pam
1.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pam
bullseye
1.4.0-9+deb11u1
fixed
bookworm
1.5.2-6+deb12u1
fixed
sid
1.5.3-7
fixed
trixie
1.5.3-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pam
natty
not-affected
maverick
Fixed 1.1.1-4ubuntu2.2
released
lucid
Fixed 1.1.1-2ubuntu5.2
released
karmic
ignored
hardy
Fixed 0.99.7.1-5ubuntu6.3
released
dapper
ignored
References