Type: | BUG |
Impact: | NA |
Release Date: | 2018-06-06 |
[1.1.1-24.0.1]
- Fix field parsing for pam_group and pam_time (John Haxby) [orabug 22589461]
[1.1.1-24]
- pam_faillock: support permanent locking of user with
unlock_time=never option
[1.1.1-23]
- pam_succeed_if: properly work with large uids
- pam_unix: add no_pass_expiry option for ignoring password
expiration in crond and sshd with public key authentication
- pam_access: check for (group) match first (#1359303)
[1.1.1-22]
- pam_tally2: added no_lockf_timeout option, do not use it
- pam_tally2: added debug option
- pam_tally2: do not create the log file as executable (#1186361)
- add manpage symlink for environment(5) (#1110258)
- pam_group: add support for Development/Debug syntax (#1114220)
[1.1.1-21]
- fix CVE-2015-3238 - DoS due to blocking pipe with very long password
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle VM 3.4 (x86_64) | pam-1.1.1-24.0.1.el6.src.rpm | f86d939172d13ba42f744925458b65ac0201bd14272a57a7386db224d235b409 | - | ovm34_x86_64_latest |
pam-1.1.1-24.0.1.el6.x86_64.rpm | befff718a525ddfff0f49dc696c7766a3266358f77f4867162f8d7b7479df42a | - | ovm34_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team