| + |
The module pam_namespace in linux-pam <= 1.7.0 may access user-controlled paths without proper protections, which allows a local user to elevate their privileges to root via multiple symlink attacks and race conditions. |
| - |
The module pam_namespace in linux-pam <= 1.7.0 may access user-controlled paths without proper protections, which allows |
| - |
a local user to elevate their privileges to root via multiple symlink attacks and race conditions. |
| |
|
| |
Systems are vulnerable if they use pam_namespace to polyinstantiate a directory for which the path to the polyinstantiated directory is under user-control or the path to the instance directory is under user-control. |