---

Red Hat, Inc. Security Advisory: New PAM packages available


                   Red Hat, Inc. Security Advisory

Synopsis:         New PAM packages available
Advisory ID:      RHSA-1999:040
Issue date:       10/13/1999
Updated on:       10/13/1999
Keywords:         pam security login NIS server
Cross references: N/A      

1. Topic:

Under some network configurations PAM (Pluggable Authentication
Modules) will fail to lock access to disabled NIS accounts.

2. Problem description:

The PAM packages shipped with Red Hat Linux 6.1/Intel may allow
access to locked NIS accounts on certain network configurations. If
you have a Red Hat Linux 6.1 workstation performing authentication
against a NIS server then you are at risk. Red Hat recommends that
you upgrade the PAM packages on all Red Hat Linux 6.1 workstations
to the versions announced in this advisory.

Previous versions of Red Hat Linux are not affected by this
problem.

3. Bug IDs fixed (http://developer.redhat.com/bugzilla for more
info):

4. Relevant releases/architectures:
Red Hat Linux 6.1 for i386

5. Obsoleted by:
N/A

6. Conflicts with:
N/A

7. RPMs required:
ftp://updates.redhat.com/6.1/i386/pam-0.68-8.i386.rpm

ftp://updates.redhat.com/6.1/SRPMS/pam-0.68-8.src.rpm

8. Solution:

For each RPM for your particular architecture, run:

rpm -Uvh

where filename is the name of the RPM.

9. Verification:

MD5 sum                           Package Name

9fd42c57d02ac039093b6f94132eee0e  SRPMS/pam-0.68-8.src.rpm
e8d5b9edf5dc9998ee19d91b7620f2ad  i386/pam-0.68-8.i386.rpm

These packages are GPG signed by Red Hat Inc. for security. Our
key is available at:

http://www.redhat.com/corp/contact.html

You can verify each package with the following command:

rpm –checksig

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:

rpm –checksig –nogpg

10. References:

Cristian

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis