[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]
(fwd) [RHSA-2000:120-04] Updated PAM packages available.
[Redhat users, please upgrade -- Raju]
This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------
Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: aleph1@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
Mime-version: 1.0
Content-type: text/plain; charset="iso-8859-1"
Approved: ewt@xxxxxxxxxx
Message-ID: <200012012152.eB1Lqru25284@xxxxxxxxxxxxxxxxxxx>
Reply-To: bugzilla@xxxxxxxxxx
X-To: redhat-watch-list@xxxxxxxxxx
X-cc: security-alert@xxxxxxxxxxxxxxxxx, linux-security@xxxxxxxxxx,
security@xxxxxxxxxx
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by biznetindia.com id eB4JUZQ31872
From: bugzilla@xxxxxxxxxx
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject: [RHSA-2000:120-04] Updated PAM packages available.
Date: Fri, 1 Dec 2000 16:52:00 -0500
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Updated PAM packages available.
Advisory ID: RHSA-2000:120-04
Issue date: 2000-11-29
Updated on: 2000-12-01
Product: Red Hat Linux
Keywords: PAM
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
Updated PAM packages are now available for Red Hat Linux 6.x and 7.
2. Relevant releases/architectures:
Red Hat Linux 6.0 - i386, alpha, sparc
Red Hat Linux 6.1 - i386, alpha, sparc
Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 6.2EE - i386, alpha, sparc
Red Hat Linux 7.0 - i386, alpha
Red Hat Linux 7.0J - i386, alpha
3. Problem description:
Red Hat Linux 7 and a previous PAM errata issued for Red Hat Linux 6.x both
included a new module, pam_localuser. Although this module is not used in
any default configurations, the version included was vulnerable to a buffer
overflow. These updates remove this vulnerability and fix various other
bugs.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
14740 - pam_cracklib: 'similiar()' broken
16456 - files missing from pam-0.72-20
18055 - Passwords can't be changed
20542 - PAM doesn't set RLIMIT_LOCKS when compiled against glibc-2.2 headers
21467 - /etc/security/access.conf error in example
6. RPMs required:
Red Hat Linux 6.0:
sparc:
ftp://updates.redhat.com/6.0/sparc/pam-0.72-20.6.x.sparc.rpm
i386:
ftp://updates.redhat.com/6.0/i386/pam-0.72-20.6.x.i386.rpm
alpha:
ftp://updates.redhat.com/6.0/alpha/pam-0.72-20.6.x.alpha.rpm
sources:
ftp://updates.redhat.com/6.0/SRPMS/pam-0.72-20.6.x.src.rpm
Red Hat Linux 6.1:
alpha:
ftp://updates.redhat.com/6.1/alpha/pam-0.72-20.6.x.alpha.rpm
sparc:
ftp://updates.redhat.com/6.1/sparc/pam-0.72-20.6.x.sparc.rpm
i386:
ftp://updates.redhat.com/6.1/i386/pam-0.72-20.6.x.i386.rpm
sources:
ftp://updates.redhat.com/6.1/SRPMS/pam-0.72-20.6.x.src.rpm
Red Hat Linux 6.2:
alpha:
ftp://updates.redhat.com/6.2/alpha/pam-0.72-20.6.x.alpha.rpm
sparc:
ftp://updates.redhat.com/6.2/sparc/pam-0.72-20.6.x.sparc.rpm
i386:
ftp://updates.redhat.com/6.2/i386/pam-0.72-20.6.x.i386.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/pam-0.72-20.6.x.src.rpm
Red Hat Linux 7.0:
alpha:
ftp://updates.redhat.com/7.0/alpha/pam-0.72-37.alpha.rpm
i386:
ftp://updates.redhat.com/7.0/i386/pam-0.72-37.i386.rpm
sources:
ftp://updates.redhat.com/7.0/SRPMS/pam-0.72-37.src.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
bb1b95b6ecb575cf661829f88e204a3e 6.0/SRPMS/pam-0.72-20.6.x.src.rpm
7ea244b2447e4857421dd1a65ba966aa 6.0/alpha/pam-0.72-20.6.x.alpha.rpm
e826a8c60ee167d70f33ef117d0c3742 6.0/i386/pam-0.72-20.6.x.i386.rpm
818881ffe3d0fd6912b06fa17f09416c 6.0/sparc/pam-0.72-20.6.x.sparc.rpm
bb1b95b6ecb575cf661829f88e204a3e 6.1/SRPMS/pam-0.72-20.6.x.src.rpm
7ea244b2447e4857421dd1a65ba966aa 6.1/alpha/pam-0.72-20.6.x.alpha.rpm
e826a8c60ee167d70f33ef117d0c3742 6.1/i386/pam-0.72-20.6.x.i386.rpm
818881ffe3d0fd6912b06fa17f09416c 6.1/sparc/pam-0.72-20.6.x.sparc.rpm
bb1b95b6ecb575cf661829f88e204a3e 6.2/SRPMS/pam-0.72-20.6.x.src.rpm
7ea244b2447e4857421dd1a65ba966aa 6.2/alpha/pam-0.72-20.6.x.alpha.rpm
e826a8c60ee167d70f33ef117d0c3742 6.2/i386/pam-0.72-20.6.x.i386.rpm
818881ffe3d0fd6912b06fa17f09416c 6.2/sparc/pam-0.72-20.6.x.sparc.rpm
9cb817f5daf291feeae03ea10b97f42b 7.0/SRPMS/pam-0.72-37.src.rpm
35b9f1e8b06a18f091fd7d9f4e61caa9 7.0/alpha/pam-0.72-37.alpha.rpm
9357b4322e4b08e140e7a5a1558fef48 7.0/i386/pam-0.72-37.i386.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
Copyright(c) 2000 Red Hat, Inc.
------------------------------
End of this Digest
******************