[Oraclevm-errata] OVMSA-2015-0117 Moderate: Oracle VM 3.3 pam security update

Errata Announcements for Oracle VM oraclevm-errata at oss.oracle.com
Tue Aug 18 18:57:21 PDT 2015


Oracle VM Security Advisory OVMSA-2015-0117

The following updated rpms for Oracle VM 3.3 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
pam-1.1.1-20.el6_7.1.x86_64.rpm


SRPMS:
http://oss.oracle.com/oraclevm/server/3.3/SRPMS-updates/pam-1.1.1-20.el6_7.1.src.rpm



Description of changes:

[1.1.1-20.1]
- fix CVE-2015-3238 - DoS due to blocking pipe with very long password

[1.1.1-20]
- make pam_pwhistory and pam_unix tolerant of opasswd file corruption

[1.1.1-19]
- pam_userdb: allow any crypt hash algorithm to be used (#1119289)

[1.1.1-18]
- pam_cracklib: improve documentation (#889233)
- unbreak authentication if ld.so.preload is not empty
- correct off by one error in account expiration calculation (#947011)
- pam_console_apply: do not print error if console.perms.d is empty
- properly handle all cases where crypt() might return NULL (#1026203)
- pam_limits: clarify documentation of maxsyslogins limit (#1028490)
- pam_access: call DNS resolution only when necessary and cache
   results (#1029817)
- pam_limits: nofile applies to file descriptors not files (#1040664)
- pam_limits: check whether the utmp login entry is valid (#1054936)
- correct URLs in spec file (#1071770)
- pam_userdb: correct the example in man page (#1078779)
- pam_selinux: canonicalize username for getseuser() (#1083981)
- pam_access: fix netgroup matching and @user@@netgroup parsing (#740233)

[1.1.1-17]
- pam_tty_audit: allow for runtime backwards compatibility with
   old kernels

[1.1.1-15]
- add option to pam_tty_audit to disable auditing of password
   input




More information about the Oraclevm-errata mailing list