Login
Newsletter
Werbung

Sicherheit: Denial of Service in pam
Aktuelle Meldungen Distributionen
Name: Denial of Service in pam
ID: FEDORA-2011-16365
Distribution: Fedora
Plattformen: Fedora 15
Datum: So, 11. Dezember 2011, 13:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149
Applikationen: Linux-PAM

Originalnachricht

Name        : pam
Product : Fedora 15
Version : 1.1.5
Release : 1.fc15
URL : http://www.us.kernel.org/pub/linux/libs/pam/index.html
Summary : An extensible library which provides authentication for
applications
Description :
PAM (Pluggable Authentication Modules) is a system security tool that
allows system administrators to set authentication policy without
having to recompile programs that handle authentication.

-------------------------------------------------------------------------------
-
Update Information:

Low impact security update from upstream. Only minor and safe changes.
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Nov 24 2011 Tomas Mraz <tmraz@redhat.com> 1.1.5-1
- upgrade to new upstream release
* Thu Aug 25 2011 Tomas Mraz <tmraz@redhat.com> 1.1.4-4
- fix dereference in pam_env
- fix wrong parse of user@host pattern in pam_access (#732081)
* Sat Jul 23 2011 Ville Skyttä <ville.skytta@iki.fi> - 1.1.4-3
- Rebuild to fix trailing slashes in provided dirs added by rpm 4.9.1.
* Fri Jul 15 2011 Tomas Mraz <tmraz@redhat.com> 1.1.4-2
- clear supplementary groups in pam_console handler execution
* Mon Jun 27 2011 Tomas Mraz <tmraz@redhat.com> 1.1.4-1
- upgrade to new upstream release
* Tue Jun 7 2011 Tomas Mraz <tmraz@redhat.com> 1.1.3-10
- detect the shared / and make the polydir mounts private based on that
- fix memory leak and other small errors in pam_namespace
* Thu Jun 2 2011 Tomas Mraz <tmraz@redhat.com> 1.1.3-9
- add support for explicit marking of the polydir mount private (#623522)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #748817 - CVE-2011-3149 pam (pam_env): Infinite loop by expanding
certain arguments [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=748817
[ 2 ] Bug #742413 - Nonsense phrase in documentation
https://bugzilla.redhat.com/show_bug.cgi?id=742413
[ 3 ] Bug #712611 - 'crontab' loops on DNS if nscd not running
https://bugzilla.redhat.com/show_bug.cgi?id=712611
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update pam' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung