Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0555

Опубликовано: 19 нояб. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0555: pam security, bug fix, and enhancement update (MODERATE)

[0.99.6.2-3.26]

  • removed realtime default limits (#240123) from the package as it caused regression on machines with nonexistent realtime group

[0.99.6.2-3.25]

  • added and improved translations (#219124)
  • adjusted the default limits for realtime users (#240123)

[0.99.6.2-3.23]

  • pam_unix: truncated MD5 passwords in shadow shouldn't match (#219258)
  • pam_limits: add limits.d support (#232700)
  • pam_limits, pam_time, pam_access: add auditing of failed logins (#232993)
  • pam_namespace: expand /home/ksharma even when appended with text (#237163) original patch by Ted X. Toth
  • add some default limits for users in realtime group (#240123)
  • CVE-2007-3102 - prevent audit log injection through user name (#243204)

[0.99.6.2-3.22]

  • make unix_update helper executable only by root as it isn't useful for regular user anyway

[0.99.6.2-3.21]

  • pam_namespace: better document behavior on failure (#237249)
  • pam_unix: split out passwd change to a new helper binary (#236316)

[0.99.6.2-3.19]

  • pam_selinux: improve context change auditing (#234781)

[0.99.6.2-3.18]

  • pam_console: always decrement use count (#233581)
  • pam_namespace: fix parsing config file with unknown users (#234513)

[0.99.6.2-3.17]

  • pam_namespace: unmount poly dir for override users (#229689)
  • pam_namespace: use raw context for poly dir name (#227345)
  • pam_namespace: truncate long poly dir name (append hash) (#230120)

[0.99.6.2-3.15]

  • correctly relabel tty in the default case (#229542)

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

pam

0.99.6.2-3.26.el5

pam-devel

0.99.6.2-3.26.el5

Oracle Linux i386

pam

0.99.6.2-3.26.el5

pam-devel

0.99.6.2-3.26.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 17 лет назад

Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.

redhat
больше 17 лет назад

Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.

nvd
больше 17 лет назад

Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.

debian
больше 17 лет назад

Unspecified vulnerability in the linux_audit_record_event function in ...

redhat
больше 18 лет назад

pam_console does not properly restore ownership for certain console devices when there are multiple users logged into the console and one user logs out, which might allow local users to gain privileges.