+ |
The module pam_namespace in linux-pam <= 1.7.0 may access user-controlled paths without proper protections, which allows a local user to elevate their privileges to root via multiple symlink attacks and race conditions. |
- |
The module pam_namespace in linux-pam <= 1.7.0 may access user-controlled paths without proper protections, which allows |
- |
a local user to elevate their privileges to root via multiple symlink attacks and race conditions. |
|
|
|
Systems are vulnerable if they use pam_namespace to polyinstantiate a directory for which the path to the polyinstantiated directory is under user-control or the path to the instance directory is under user-control. |