OVMBA-2018-0154

OVMBA-2018-0154 - pam bug fix update

Type:BUG
Impact:NA
Release Date:2018-06-06

Description


[1.1.1-24.0.1]
- Fix field parsing for pam_group and pam_time (John Haxby) [orabug 22589461]

[1.1.1-24]
- pam_faillock: support permanent locking of user with
unlock_time=never option

[1.1.1-23]
- pam_succeed_if: properly work with large uids
- pam_unix: add no_pass_expiry option for ignoring password
expiration in crond and sshd with public key authentication
- pam_access: check for (group) match first (#1359303)

[1.1.1-22]
- pam_tally2: added no_lockf_timeout option, do not use it
- pam_tally2: added debug option
- pam_tally2: do not create the log file as executable (#1186361)
- add manpage symlink for environment(5) (#1110258)
- pam_group: add support for Development/Debug syntax (#1114220)

[1.1.1-21]
- fix CVE-2015-3238 - DoS due to blocking pipe with very long password




Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.4 (x86_64) pam-1.1.1-24.0.1.el6.src.rpmf86d939172d13ba42f744925458b65ac0201bd14272a57a7386db224d235b409-ovm34_x86_64_latest
pam-1.1.1-24.0.1.el6.x86_64.rpmbefff718a525ddfff0f49dc696c7766a3266358f77f4867162f8d7b7479df42a-ovm34_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete