CVE-2011-3148
Publication date 24 October 2011
Last updated 24 July 2024
Ubuntu priority
Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
References
Related Ubuntu Security Notices (USN)
- USN-1237-1
- PAM vulnerabilities
- 24 October 2011