[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package pam-1.3.1-37.el8_10.inferit.x86_64 download

Name pam
Epoch 0
Version 1.3.1
Release 37.el8_10.inferit
Architecture x86_64
Website/URL http://www.linux-pam.org/
License BSD and GPLv2+
Build Time 2025-07-02 11:53:11
Build Host builder-x86-04.inferitos.ru
Summary An extensible library which provides authentication for applications
Repositories BaseOS
Description PAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policy without having to recompile programs that handle authentication.
Errata INFSA-2025:10027
Size 748 KiB
Source Project pam-1.3.1-37.el8_10.inferit
SHA-256 checksum adda50e3605f14e7b2afecae0d9f223eceb510196bc13e50ec284290a35fdf38
× Full screenshot
Changelog link
* Mon Jun 16 2025 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-37
- pam_namespace: fix potential privilege escalation.
  Resolves: CVE-2025-6020 and RHEL-96724

* Wed Nov 27 2024 Sergey Cherevko <s.cherevko@msvsphere-os.ru> - 1.3.1-36.inferit
- Update to 1.3.1-36

* Mon Nov 25 2024 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-36
- pam_access: rework resolving of tokens as hostname.
  Resolves: CVE-2024-10963 and RHEL-66242

* Mon Nov 04 2024 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-35
- pam_unix: always run the helper to obtain shadow password file entries.
  CVE-2024-10041. Resolves: RHEL-62877
- pam_access: always match local address and clarify LOCAL keyword behaviour.
  Resolves: RHEL-23018
- libpam: support long lines in service files. Resolves: RHEL-5051

* Wed Jul 03 2024 Sergey Cherevko <s.cherevko@msvsphere-os.ru> - 1.3.1-34.inferit
- Update to 1.3.1-34

* Thu Apr 04 2024 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-34
- fix formatting of audit messages. Resolves: RHEL-28620

* Thu Mar 14 2024 Sergey Cherevko <s.cherevko@msvsphere-os.ru> - 1.3.1-27.inferit
- Fix Russian translation
- Rebuilt for MSVSphere 8.9

* Mon Feb 12 2024 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-33
- pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS
  situations. CVE-2024-22365. Resolves: RHEL-21242

* Fri Jan 26 2024 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-32
- pam_access: handle hostnames in access.conf. Resolves: RHEL-3374

* Mon Jan 08 2024 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-31
- pam_faillock: create tallydir before creating tallyfile. Resolves: RHEL-19810