blob: 77043c49b796b0c08b353f172adf29a6b3256cc7 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200903-39">
<title>pam_krb5: Privilege escalation</title>
Two vulnerabilities in pam_krb5 might allow local users to elevate their
privileges or overwrite arbitrary files.
<product type="ebuild">pam_krb5</product>
<announced>March 25, 2009</announced>
<revised>March 25, 2009: 01</revised>
<package name="sys-auth/pam_krb5" auto="yes" arch="*">
<unaffected range="ge">3.12</unaffected>
<vulnerable range="lt">3.12</vulnerable>
pam_krb5 is a a Kerberos v5 PAM module.
The following vulnerabilities were discovered:
does not properly initialize the Kerberos libraries for setuid use
<li>Derek Chan reported that calls to
pam_setcred() are not properly handled when running setuid
<impact type="high">
A local attacker could set an environment variable to point to a
specially crafted Kerberos configuration file and launch a PAM-based
setuid application to elevate privileges, or change ownership and
overwrite arbitrary files.
There is no known workaround at this time.
All pam_krb5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_krb5-3.12&quot;</code>
<uri link="">CVE-2009-0360</uri>
<uri link="">CVE-2009-0361</uri>
<metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:23:59 +0000">
<metadata tag="submitter" timestamp="Mon, 09 Mar 2009 12:57:24 +0000">
<metadata tag="bugReady" timestamp="Mon, 09 Mar 2009 12:57:36 +0000">