Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469
http://www.ubuntu.com/usn/USN-1237-1
http://security.gentoo.org/glsa/glsa-201206-31.xml
http://secunia.com/advisories/49711