-
Tue Jul 19 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.8-18
- pam_succeed_if: fix handling of large uids, tty, and rhost
-
Mon May 30 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.8-17
- fix pam_fail_delay() manual page (#1130053)
-
Thu Apr 28 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.8-15
- pam_faillock: support permanent locking of user with
unlock_time=never option
-
Fri Apr 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.8-14
- pam_unix: add no_pass_expiry option for ignoring password
expiration in crond and sshd with public key authentication
- add manual page for environment(5) (#1110257)
- pam_loginuid: log if auditd not detected
- always ignore audit error when -EPERM is returned (#1287800)
- pam_lastlog: fix possible NULL dereference when localtime fails (#1313537)
-
Tue Aug 04 2015 Tomáš Mráz <tmraz@redhat.com> 1.1.8-13
- fix CVE-2015-3238 - DoS due to blocking pipe with very long password
-
Fri Oct 17 2014 Tomáš Mráz <tmraz@redhat.com> 1.1.8-12
- use USER_MGMT type for auditing in the pam_tally2 and faillock
apps (#1151576)
-
Thu Sep 11 2014 Tomáš Mráz <tmraz@redhat.com> 1.1.8-11
- be tolerant to corrupted opasswd file
- audit the module names that granted access
- pam_userdb: correct the example in man page (#1078784)
- pam_limits: check whether the utmp login entry is valid (#1080023)
- pam_console_apply: do not print error if console.perms.d is empty
- pam_limits: nofile refers to open file descriptors (#1111220)
- apply PIE and full RELRO to all binaries built
-
Mon Aug 25 2014 Tomáš Mráz <tmraz@redhat.com> 1.1.8-10
- pam_lastlog: fix uninitialized access of parts of lastlog structure
-
Mon Mar 31 2014 Tomáš Mráz <tmraz@redhat.com> 1.1.8-9
- fix CVE-2014-2583: potential path traversal issue in pam_timestamp
- pam_pwhistory: call the helper if SELinux enabled
-
Tue Mar 11 2014 Tomáš Mráz <tmraz@redhat.com> 1.1.8-8
- fix CVE-2013-7041: use case sensitive comparison in pam_userdb