- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0135 - Bug Fix Advisory
Synopsis
pam_krb5 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated pam_krb5 packages that resolve several issues are now available.
Description
The pam_krb5 module allows Pluggable Authentication Modules (PAM) aware
applications to use Kerberos to verify user identities by obtaining user
credentials at log in time.
These updated pam_krb5 packages provide fixes for the following bugs:
- when obtaining credentials for use with the Andrew File System (AFS), if
the AFS cell's name and the Kerberos realm's name differed only in the case
of the letters, the pam_krb5 module would assume that the cell name was
used as a component of the AFS service's principal name. On networks where
this was not the case, it led to unavoidable delays as the client attempted
to fetch credentials for use with a non-existent server before moving on
and guessing the correct principal name. This update adds a new parameter
to the afs5log utility that reverses the order in which it performs its
guesses in these cases. To use this new capability in the pam_krb5 module,
the "null_afs = yes" parameter should be set in the krb5.conf configuration
file. Also, afs5log can now be invoked with the '--nullafs' switch, or with
its corresponding short option, '-n'.
- when a user's password had expired, the pam_krb5 module would not prevent
the Kerberos library from attempting to change the user's password during
an authentication attempt, which was incorrect behavior for a PAM module.
In these updated packages, the pam_krb5 module does prevent the Kerberos
library from attempting to change the user's password during an
authentication attempt, thus bringing its behavior more in line with proper
Pluggable Authentication Module behavior.
- the pam_krb5.so module could not be opened using the dlopen() function
unless the calling application had linked with the libpam library. This
update links the module directly with libpam in order to avoid this issue.
- the pam_krb5 module would crash due to a segmentation fault when the
pam_get_user() function indicated success but returned a NULL value for the
user name, as could happen if a user entered the CTRL-D control code for
the password (which sends an EOF, or End-of-File, character). In these
updated packages, the pam_krb5 module treats a NULL value for the user name
when the pam_get_user() function returns successfully as an error, thus
resolving the issue.
- log messages sent to the system log were logged to the LOG_USER facility
instead of the LOG_AUTHPRIV facility. This update corrects this mistake.
- an attempt to change a non-existent user's password would fail with a
PAM_AUTH_ERR result instead of the more correct and specific
PAM_USER_UNKNOWN result. This update corrects this bug.
All users of pam_krb5 are advised to upgrade to these updated packages,
which resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 249558 - [PATCH]: use instance-less AFS service tickets
- BZ - 354291 - pam_krb5 : syslog messages
- BZ - 400611 - [RHEL 5] pam_sm_chauthtok() of rel5 pam_krb5 returns PAM_AUTH_ERR (7) if a user is not a Kerberos user.
- BZ - 402721 - pam_krb5 password changing problem
- BZ - 460998 - PAM unable to dlopen(/lib/security/pam_krb5.so)
- BZ - 467208 - SIGSEGV on CTRL+D
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
pam_krb5-2.2.14-10.src.rpm | SHA-256: 3bc21ec5bbdc1459f3d0ed78a20c6fe5074800e5658ebbf9e4a09943277fa5d6 |
x86_64 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
pam_krb5-2.2.14-10.x86_64.rpm | SHA-256: 334d7f21d879ba0418b4a831d2f495d025068fcf6e94b34b1de364b93cbd3ef9 |
ia64 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
pam_krb5-2.2.14-10.ia64.rpm | SHA-256: 0e2ebe6638f1d27b67dc624fd70024c96bec62e8f967d8acbcda494122c33870 |
i386 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
pam_krb5-2.2.14-10.src.rpm | SHA-256: 3bc21ec5bbdc1459f3d0ed78a20c6fe5074800e5658ebbf9e4a09943277fa5d6 |
x86_64 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
pam_krb5-2.2.14-10.x86_64.rpm | SHA-256: 334d7f21d879ba0418b4a831d2f495d025068fcf6e94b34b1de364b93cbd3ef9 |
i386 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
pam_krb5-2.2.14-10.src.rpm | SHA-256: 3bc21ec5bbdc1459f3d0ed78a20c6fe5074800e5658ebbf9e4a09943277fa5d6 |
x86_64 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
pam_krb5-2.2.14-10.x86_64.rpm | SHA-256: 334d7f21d879ba0418b4a831d2f495d025068fcf6e94b34b1de364b93cbd3ef9 |
i386 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
pam_krb5-2.2.14-10.src.rpm | SHA-256: 3bc21ec5bbdc1459f3d0ed78a20c6fe5074800e5658ebbf9e4a09943277fa5d6 |
s390x | |
pam_krb5-2.2.14-10.s390.rpm | SHA-256: 4e4a1dc14637c70cae09bd9e2da8858632e2e35f26f5beab8d2b4e2a8256ab50 |
pam_krb5-2.2.14-10.s390x.rpm | SHA-256: 540ca3667e0b744196aefeac8b371e57aa568f8cfbb931abdaab73bb18e41bf8 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
pam_krb5-2.2.14-10.src.rpm | SHA-256: 3bc21ec5bbdc1459f3d0ed78a20c6fe5074800e5658ebbf9e4a09943277fa5d6 |
ppc | |
pam_krb5-2.2.14-10.ppc.rpm | SHA-256: 6ed2294f0481b4f463dbacdfbc943feab1972c196f032648706720034d1049bb |
pam_krb5-2.2.14-10.ppc64.rpm | SHA-256: 3adc285363c5d0b3d6833dac0d01162482a929fa76e6d4920dc7af279b41fe2b |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
pam_krb5-2.2.14-10.src.rpm | SHA-256: 3bc21ec5bbdc1459f3d0ed78a20c6fe5074800e5658ebbf9e4a09943277fa5d6 |
x86_64 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
pam_krb5-2.2.14-10.x86_64.rpm | SHA-256: 334d7f21d879ba0418b4a831d2f495d025068fcf6e94b34b1de364b93cbd3ef9 |
i386 | |
pam_krb5-2.2.14-10.i386.rpm | SHA-256: 370b00b171134dbccbc34fdd996a8e8f93fa81e3020acf9440889fe00cfdf3e1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.