| Summary: | pam new security issue CVE-2015-3238 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/649947/ | ||
| Whiteboard: | MGA4TOO MGA4-32-OK advisory MGA4-64-OK MGA5-32-OK MGA5-64-OK | ||
| Source RPM: | pam-1.1.8-10.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-06-26 01:45:23 CEST
David Walser
2015-06-26 01:46:16 CEST
Whiteboard:
(none) =>
MGA5TOO, MGA4TOO Fedora has issued an advisory for this on June 27: https://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html URL:
(none) =>
http://lwn.net/Vulnerabilities/649947/ Patched packages uploaded for Mageia 4, Mageia 5, and Cauldron. Advisory: ======================== Updated pam packages fix security vulnerability: If SELinux is enabled, the _unix_run_helper_binary function in Linux-PAM 1.1.8 and earlier hangs indefinitely when verifying a password of 65536 characters, which allows attackers to conduct username enumeration and denial of service attacks (CVE-2015-3238). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238 https://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html ======================== Updated packages in core/updates_testing: ======================== pam-1.1.8-7.2.mga4 pam-doc-1.1.8-7.2.mga4 libpam0-1.1.8-7.2.mga4 libpam-devel-1.1.8-7.2.mga4 pam-1.1.8-10.1.mga5 pam-doc-1.1.8-10.1.mga5 libpam0-1.1.8-10.1.mga5 libpam-devel-1.1.8-10.1.mga5 from SRPMS: pam-1.1.8-7.2.mga4.src.rpm pam-1.1.8-10.1.mga5.src.rpm Version:
Cauldron =>
5 Tested Mageia 4 i586 by just testing that I could still log in at the console, use su, and ssh into this machine. Whiteboard:
MGA4TOO =>
MGA4TOO MGA4-32-OK Advisory committed to svn. CC:
(none) =>
davidwhodgins Testing complete. Someone from the sysadmin team please push 16212.adv to updates. Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0266.html Status:
NEW =>
RESOLVED |