Red Hat, Inc. Security Advisory Synopsis: New PAM packages available Advisory ID: RHSA-1999:040 Issue date: 10/13/1999 Updated on: 10/13/1999 Keywords: pam security login NIS server Cross references: N/A
1. Topic:
Under some network configurations PAM (Pluggable Authentication
Modules) will fail to lock access to disabled NIS accounts.
2. Problem description:
The PAM packages shipped with Red Hat Linux 6.1/Intel may allow
access to locked NIS accounts on certain network configurations. If
you have a Red Hat Linux 6.1 workstation performing authentication
against a NIS server then you are at risk. Red Hat recommends that
you upgrade the PAM packages on all Red Hat Linux 6.1 workstations
to the versions announced in this advisory.
Previous versions of Red Hat Linux are not affected by this
problem.
3. Bug IDs fixed (http://developer.redhat.com/bugzilla for more
info):
4. Relevant releases/architectures:
Red Hat Linux 6.1 for i386
5. Obsoleted by:
N/A
6. Conflicts with:
N/A
7. RPMs required:
ftp://updates.redhat.com/6.1/i386/pam-0.68-8.i386.rpm
ftp://updates.redhat.com/6.1/SRPMS/pam-0.68-8.src.rpm
8. Solution:
For each RPM for your particular architecture, run:
rpm -Uvh
where filename is the name of the RPM.
9. Verification:
MD5 sum Package Name
9fd42c57d02ac039093b6f94132eee0e SRPMS/pam-0.68-8.src.rpm e8d5b9edf5dc9998ee19d91b7620f2ad i386/pam-0.68-8.i386.rpm
These packages are GPG signed by Red Hat Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm –checksig
If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg
10. References:
Cristian
—