Vulnerability Description
pam-python before 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM setups.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pam-Python Project | Pam-Python | < 1.0.7-1 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 16.04 |
References
- https://bugzilla.suse.com/show_bug.cgi?id=1150510#c1Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/11/msg00020.htmlMailing ListThird Party Advisory
- https://sourceforge.net/p/pam-python/code/ci/0247ab687b4347cc52859ca461fb0126dd7Patch
- https://tracker.debian.org/news/1066790/accepted-pam-python-107-1-source-amd64-aMailing ListThird Party Advisory
- https://usn.ubuntu.com/4552-1/Third Party Advisory
- https://usn.ubuntu.com/4552-2/Third Party Advisory
- https://www.debian.org/security/2019/dsa-4555Third Party Advisory
- https://bugzilla.suse.com/show_bug.cgi?id=1150510#c1Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/11/msg00020.htmlMailing ListThird Party Advisory
- https://sourceforge.net/p/pam-python/code/ci/0247ab687b4347cc52859ca461fb0126dd7Patch
- https://tracker.debian.org/news/1066790/accepted-pam-python-107-1-source-amd64-aMailing ListThird Party Advisory
- https://usn.ubuntu.com/4552-1/Third Party Advisory
- https://usn.ubuntu.com/4552-2/Third Party Advisory
- https://www.debian.org/security/2019/dsa-4555Third Party Advisory
FAQ
What is CVE-2019-16729?
CVE-2019-16729 is a vulnerability with a CVSS score of 7.8 (HIGH). pam-python before 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM setups.
How severe is CVE-2019-16729?
CVE-2019-16729 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16729?
Check the references section above for vendor advisories and patch information. Affected products include: Pam-Python Project Pam-Python, Debian Debian Linux, Canonical Ubuntu Linux.