ELSA-2024-10244

ELSA-2024-10244 - pam:1.5.1 security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2024-11-25

Description


[1.5.1-22.0.1]
- pam_access: clean up the remote host matching code [Orabug: 36771903]
- pam_limits: fix use after free in pam_sm_open_session [Orabug: 36406534]

[1.5.1-22]
- pam_access: rework resolving of tokens as hostname.
Resolves: CVE-2024-10963 and RHEL-66245

[1.5.1-21]
- pam_unix: always run the helper to obtain shadow password file entries.
CVE-2024-10041. Resolves: RHEL-62880


Related CVEs


CVE-2024-10963

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) pam-1.5.1-22.0.1.el9_5.src.rpmfea8fc5decf72278a5755ea9ba40f2198f185aed46b727cc6a8a641366e2265c-ol9_aarch64_appstream
pam-1.5.1-22.0.1.el9_5.src.rpmfea8fc5decf72278a5755ea9ba40f2198f185aed46b727cc6a8a641366e2265c-ol9_aarch64_baseos_latest
pam-1.5.1-22.0.1.el9_5.src.rpmfea8fc5decf72278a5755ea9ba40f2198f185aed46b727cc6a8a641366e2265c-ol9_aarch64_u5_baseos_patch
pam-1.5.1-22.0.1.el9_5.aarch64.rpm7b0f6f69551e74c7f51fd6ec2ea0c04c2821034ca815fc7a94affce6b937eb16-ol9_aarch64_baseos_latest
pam-1.5.1-22.0.1.el9_5.aarch64.rpm7b0f6f69551e74c7f51fd6ec2ea0c04c2821034ca815fc7a94affce6b937eb16-ol9_aarch64_u5_baseos_patch
pam-devel-1.5.1-22.0.1.el9_5.aarch64.rpm4e22bb9576de242643ed3cce16b29e79d8e0bb3882ac442f059fac99d86565a1-ol9_aarch64_appstream
pam-docs-1.5.1-22.0.1.el9_5.aarch64.rpm65fe43f2bc606437fdc77abdb7b406fa0aaa8d4358814dd7a3a290b3f3830e76-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) pam-1.5.1-22.0.1.el9_5.src.rpmfea8fc5decf72278a5755ea9ba40f2198f185aed46b727cc6a8a641366e2265c-ol9_x86_64_appstream
pam-1.5.1-22.0.1.el9_5.src.rpmfea8fc5decf72278a5755ea9ba40f2198f185aed46b727cc6a8a641366e2265c-ol9_x86_64_baseos_latest
pam-1.5.1-22.0.1.el9_5.src.rpmfea8fc5decf72278a5755ea9ba40f2198f185aed46b727cc6a8a641366e2265c-ol9_x86_64_u5_baseos_patch
pam-1.5.1-22.0.1.el9_5.i686.rpmf11e8266f277d4e9acd99a40b59991c07444263dec64256b482c7470a2303271-ol9_x86_64_baseos_latest
pam-1.5.1-22.0.1.el9_5.i686.rpmf11e8266f277d4e9acd99a40b59991c07444263dec64256b482c7470a2303271-ol9_x86_64_u5_baseos_patch
pam-1.5.1-22.0.1.el9_5.x86_64.rpm9ca74ba4aae201ff06f7a435044f8cbaef6388e2cccc76ec6700770a5f15d9e5-ol9_x86_64_baseos_latest
pam-1.5.1-22.0.1.el9_5.x86_64.rpm9ca74ba4aae201ff06f7a435044f8cbaef6388e2cccc76ec6700770a5f15d9e5-ol9_x86_64_u5_baseos_patch
pam-devel-1.5.1-22.0.1.el9_5.i686.rpmf38d969c6249cc1d1d436e160269cb9bb178f20e293e2161280502fd592c2004-ol9_x86_64_appstream
pam-devel-1.5.1-22.0.1.el9_5.x86_64.rpm4a417a2144f706aeb2ae800dbad3a8deabc39add3f932ebeb175214de820ba9d-ol9_x86_64_appstream
pam-docs-1.5.1-22.0.1.el9_5.x86_64.rpm6005ec6074df208cbe02b87a2eff13b621eb6769b2d487cc1ddaa51f7b20d60f-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete