OVMSA-2015-0117 - pam security update
Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2015-08-18 |
Description
[1.1.1-20.1]
- fix CVE-2015-3238 - DoS due to blocking pipe with very long password
[1.1.1-20]
- make pam_pwhistory and pam_unix tolerant of opasswd file corruption
[1.1.1-19]
- pam_userdb: allow any crypt hash algorithm to be used (#1119289)
[1.1.1-18]
- pam_cracklib: improve documentation (#889233)
- unbreak authentication if ld.so.preload is not empty
- correct off by one error in account expiration calculation (#947011)
- pam_console_apply: do not print error if console.perms.d is empty
- properly handle all cases where crypt() might return NULL (#1026203)
- pam_limits: clarify documentation of maxsyslogins limit (#1028490)
- pam_access: call DNS resolution only when necessary and cache
results (#1029817)
- pam_limits: nofile applies to file descriptors not files (#1040664)
- pam_limits: check whether the utmp login entry is valid (#1054936)
- correct URLs in spec file (#1071770)
- pam_userdb: correct the example in man page (#1078779)
- pam_selinux: canonicalize username for getseuser() (#1083981)
- pam_access: fix netgroup matching and @user@@netgroup parsing (#740233)
[1.1.1-17]
- pam_tty_audit: allow for runtime backwards compatibility with
old kernels
[1.1.1-15]
- add option to pam_tty_audit to disable auditing of password
input
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.3 (x86_64) | pam-1.1.1-20.el6_7.1.src.rpm | e14ae0e5ff521022e8e7da9705aabd78 | OVMBA-2018-0154 |
| pam-1.1.1-20.el6_7.1.x86_64.rpm | fd1ae872bf550198315423c56e704349 | OVMBA-2018-0154 |
|
Oracle VM 3.4 (x86_64) | pam-1.1.1-20.el6_7.1.src.rpm | e14ae0e5ff521022e8e7da9705aabd78 | OVMBA-2018-0154 |
| pam-1.1.1-20.el6_7.1.x86_64.rpm | fd1ae872bf550198315423c56e704349 | OVMBA-2018-0154 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team