Skip to navigation

Security Advisory Moderate: pam security, bug fix, and enhancement update

Advisory: RHSA-2013:0521-2
Type: Security Advisory
Severity: Moderate
Issued on: 2013-02-21
Last updated on: 2013-02-21
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-3148
CVE-2011-3149

Details

Updated pam packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Pluggable Authentication Modules (PAM) provide a system whereby
administrators can set up authentication policies without having to
recompile programs to handle authentication.

A stack-based buffer overflow flaw was found in the way the pam_env module
parsed users' "~/.pam_environment" files. If an application's PAM
configuration contained "user_readenv=1" (this is not the default), a
local attacker could use this flaw to crash the application or, possibly,
escalate their privileges. (CVE-2011-3148)

A denial of service flaw was found in the way the pam_env module expanded
certain environment variables. If an application's PAM configuration
contained "user_readenv=1" (this is not the default), a local attacker
could use this flaw to cause the application to enter an infinite loop.
(CVE-2011-3149)

Red Hat would like to thank Kees Cook of the Google ChromeOS Team for
reporting the CVE-2011-3148 and CVE-2011-3149 issues.

These updated pam packages include numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users
are directed to the Red Hat Enterprise Linux 6.4 Technical Notes, linked
to in the References, for information on the most significant of these
changes.

All pam users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
pam-1.1.1-13.el6.src.rpm
File outdated by:  RHEA-2013:1734
    MD5: 6a8057ff49cb52a20f22af4cd4d62435
SHA-256: 23d4898760059a930a1cb2c76b814dc36ad48d3a3168f5ad1bdadd026ba40aa6
 
IA-32:
pam-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 450f4f0c3e25f2f1df90bf44c3fd1fa5
SHA-256: a6b93fd4231e0cbdac1a330bb9820447d1ad1df500b87a895da8ced3619ec4ae
pam-debuginfo-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: ee76314fe4cf6b4363d026773be82403
SHA-256: efc880ca5b7c3eb1f058fbe213c5d9eb51c33227bcf1bf4e39a9d45e3b6ae74f
pam-devel-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 986c4b5a2614384ffff6dbbf433f4b7a
SHA-256: 6731e8534905149fc52f04630bf1496d7969844df43af1cc4f84f2f481b736fa
 
x86_64:
pam-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 450f4f0c3e25f2f1df90bf44c3fd1fa5
SHA-256: a6b93fd4231e0cbdac1a330bb9820447d1ad1df500b87a895da8ced3619ec4ae
pam-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: b00e01693edd56715cfc050806a1c0bc
SHA-256: aa4e9c082188fed69ac6029f929d7c32934795263b2c3f9e1fbc4e2c2eece013
pam-debuginfo-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: ee76314fe4cf6b4363d026773be82403
SHA-256: efc880ca5b7c3eb1f058fbe213c5d9eb51c33227bcf1bf4e39a9d45e3b6ae74f
pam-debuginfo-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 93b13186a9fe62fd1859b2f7550a2bc7
SHA-256: 6aee81c95202b7e67ea1f330dc1a3e84e7cf2a931f8e85c02bcc1346853dc454
pam-devel-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 986c4b5a2614384ffff6dbbf433f4b7a
SHA-256: 6731e8534905149fc52f04630bf1496d7969844df43af1cc4f84f2f481b736fa
pam-devel-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 3352933f76bf270be5ef6c9c03e70fd0
SHA-256: fcd8e19d8431e2a3acf9886a4e395f5a22eee66331f6b6a4969465485838367c
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
pam-1.1.1-13.el6.src.rpm
File outdated by:  RHEA-2013:1734
    MD5: 6a8057ff49cb52a20f22af4cd4d62435
SHA-256: 23d4898760059a930a1cb2c76b814dc36ad48d3a3168f5ad1bdadd026ba40aa6
 
x86_64:
pam-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 450f4f0c3e25f2f1df90bf44c3fd1fa5
SHA-256: a6b93fd4231e0cbdac1a330bb9820447d1ad1df500b87a895da8ced3619ec4ae
pam-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: b00e01693edd56715cfc050806a1c0bc
SHA-256: aa4e9c082188fed69ac6029f929d7c32934795263b2c3f9e1fbc4e2c2eece013
pam-debuginfo-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: ee76314fe4cf6b4363d026773be82403
SHA-256: efc880ca5b7c3eb1f058fbe213c5d9eb51c33227bcf1bf4e39a9d45e3b6ae74f
pam-debuginfo-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 93b13186a9fe62fd1859b2f7550a2bc7
SHA-256: 6aee81c95202b7e67ea1f330dc1a3e84e7cf2a931f8e85c02bcc1346853dc454
pam-devel-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 986c4b5a2614384ffff6dbbf433f4b7a
SHA-256: 6731e8534905149fc52f04630bf1496d7969844df43af1cc4f84f2f481b736fa
pam-devel-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 3352933f76bf270be5ef6c9c03e70fd0
SHA-256: fcd8e19d8431e2a3acf9886a4e395f5a22eee66331f6b6a4969465485838367c
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
pam-1.1.1-13.el6.src.rpm
File outdated by:  RHEA-2013:1734
    MD5: 6a8057ff49cb52a20f22af4cd4d62435
SHA-256: 23d4898760059a930a1cb2c76b814dc36ad48d3a3168f5ad1bdadd026ba40aa6
 
IA-32:
pam-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 450f4f0c3e25f2f1df90bf44c3fd1fa5
SHA-256: a6b93fd4231e0cbdac1a330bb9820447d1ad1df500b87a895da8ced3619ec4ae
pam-debuginfo-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: ee76314fe4cf6b4363d026773be82403
SHA-256: efc880ca5b7c3eb1f058fbe213c5d9eb51c33227bcf1bf4e39a9d45e3b6ae74f
pam-devel-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 986c4b5a2614384ffff6dbbf433f4b7a
SHA-256: 6731e8534905149fc52f04630bf1496d7969844df43af1cc4f84f2f481b736fa
 
PPC:
pam-1.1.1-13.el6.ppc.rpm
File outdated by:  RHEA-2013:1734
    MD5: 03d2c6c9427501bb9aa94eb2580afa3c
SHA-256: 2d93095feeea4b5c0eafd145592eec91b37b2f304e938b95b677770be8cca1d5
pam-1.1.1-13.el6.ppc64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 3fbceb97a1f638c4b9f788291194710d
SHA-256: 70f009d1126e54de42835002f46dc5760dcc4a632e923f2ae6ae496ca96ba8b7
pam-debuginfo-1.1.1-13.el6.ppc.rpm
File outdated by:  RHEA-2013:1734
    MD5: a43debc36d200a137d645003a2af5bfa
SHA-256: 294237606c5de9bdd5cbf7fbdf41c76ede730ad0286a29b108b65eeee3f82b5b
pam-debuginfo-1.1.1-13.el6.ppc64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 83395091ac1448037a6247ea1811cb8a
SHA-256: ae04797e801d9d960a0a81549f86b2160539dfb2d2f88a79033b8371c3a6532f
pam-devel-1.1.1-13.el6.ppc.rpm
File outdated by:  RHEA-2013:1734
    MD5: 32691badec62a2de191c334c348cbb58
SHA-256: 509f76e45973325199dc4b6b53f7af89995d613ab596d344b9c69a495ab7ec59
pam-devel-1.1.1-13.el6.ppc64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 122802d765655f99a36dea4936582e86
SHA-256: 2457de7503afd1eb05488f9b1d70c18c0be911370442d524bf9772dbd8bfbb93
 
s390x:
pam-1.1.1-13.el6.s390.rpm
File outdated by:  RHEA-2013:1734
    MD5: f38f0d75d946bc396bcc172f986dbac6
SHA-256: 559ac420657ac56b10fd1c60046de1618ec2b7e7c1bd1f35bd60b3e59f44d25b
pam-1.1.1-13.el6.s390x.rpm
File outdated by:  RHEA-2013:1734
    MD5: 435b10f7ad6145272723802c9fd4c964
SHA-256: c5bdb606ce15ee2375402436e30fef09ff0846bea58daf011e556b09fbe743dd
pam-debuginfo-1.1.1-13.el6.s390.rpm
File outdated by:  RHEA-2013:1734
    MD5: 70458b680fb230880fed279be31d31aa
SHA-256: 404ac9a9cdb5660ce556b63ef0c671cb9466d49e5da662ce5af580b60b3810fc
pam-debuginfo-1.1.1-13.el6.s390x.rpm
File outdated by:  RHEA-2013:1734
    MD5: dc8ebc70695d1c9afa055810ba34a256
SHA-256: 02c2901a90357583327cf8ec9ea6bbeee0b715da786eebfe49d7f521e06e8d3a
pam-devel-1.1.1-13.el6.s390.rpm
File outdated by:  RHEA-2013:1734
    MD5: de2454a76ff5ced1d148dc7109be3930
SHA-256: dc68f5ec61bf2cb11b7cdeb2a3bcdd171ceae0bb0612f8e57feeaf37ff6b246a
pam-devel-1.1.1-13.el6.s390x.rpm
File outdated by:  RHEA-2013:1734
    MD5: 421b3b014e85bbff39ff41fd3f7185d7
SHA-256: 9ef27cf861bd965e38e02d4d502f87f051c110498d27ded092d22958316f8cca
 
x86_64:
pam-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 450f4f0c3e25f2f1df90bf44c3fd1fa5
SHA-256: a6b93fd4231e0cbdac1a330bb9820447d1ad1df500b87a895da8ced3619ec4ae
pam-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: b00e01693edd56715cfc050806a1c0bc
SHA-256: aa4e9c082188fed69ac6029f929d7c32934795263b2c3f9e1fbc4e2c2eece013
pam-debuginfo-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: ee76314fe4cf6b4363d026773be82403
SHA-256: efc880ca5b7c3eb1f058fbe213c5d9eb51c33227bcf1bf4e39a9d45e3b6ae74f
pam-debuginfo-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 93b13186a9fe62fd1859b2f7550a2bc7
SHA-256: 6aee81c95202b7e67ea1f330dc1a3e84e7cf2a931f8e85c02bcc1346853dc454
pam-devel-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 986c4b5a2614384ffff6dbbf433f4b7a
SHA-256: 6731e8534905149fc52f04630bf1496d7969844df43af1cc4f84f2f481b736fa
pam-devel-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 3352933f76bf270be5ef6c9c03e70fd0
SHA-256: fcd8e19d8431e2a3acf9886a4e395f5a22eee66331f6b6a4969465485838367c
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
pam-1.1.1-13.el6.src.rpm
File outdated by:  RHEA-2013:1734
    MD5: 6a8057ff49cb52a20f22af4cd4d62435
SHA-256: 23d4898760059a930a1cb2c76b814dc36ad48d3a3168f5ad1bdadd026ba40aa6
 
IA-32:
pam-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 450f4f0c3e25f2f1df90bf44c3fd1fa5
SHA-256: a6b93fd4231e0cbdac1a330bb9820447d1ad1df500b87a895da8ced3619ec4ae
pam-debuginfo-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: ee76314fe4cf6b4363d026773be82403
SHA-256: efc880ca5b7c3eb1f058fbe213c5d9eb51c33227bcf1bf4e39a9d45e3b6ae74f
pam-devel-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 986c4b5a2614384ffff6dbbf433f4b7a
SHA-256: 6731e8534905149fc52f04630bf1496d7969844df43af1cc4f84f2f481b736fa
 
x86_64:
pam-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 450f4f0c3e25f2f1df90bf44c3fd1fa5
SHA-256: a6b93fd4231e0cbdac1a330bb9820447d1ad1df500b87a895da8ced3619ec4ae
pam-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: b00e01693edd56715cfc050806a1c0bc
SHA-256: aa4e9c082188fed69ac6029f929d7c32934795263b2c3f9e1fbc4e2c2eece013
pam-debuginfo-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: ee76314fe4cf6b4363d026773be82403
SHA-256: efc880ca5b7c3eb1f058fbe213c5d9eb51c33227bcf1bf4e39a9d45e3b6ae74f
pam-debuginfo-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 93b13186a9fe62fd1859b2f7550a2bc7
SHA-256: 6aee81c95202b7e67ea1f330dc1a3e84e7cf2a931f8e85c02bcc1346853dc454
pam-devel-1.1.1-13.el6.i686.rpm
File outdated by:  RHEA-2013:1734
    MD5: 986c4b5a2614384ffff6dbbf433f4b7a
SHA-256: 6731e8534905149fc52f04630bf1496d7969844df43af1cc4f84f2f481b736fa
pam-devel-1.1.1-13.el6.x86_64.rpm
File outdated by:  RHEA-2013:1734
    MD5: 3352933f76bf270be5ef6c9c03e70fd0
SHA-256: fcd8e19d8431e2a3acf9886a4e395f5a22eee66331f6b6a4969465485838367c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

588893 - pam does not enforce password complexity restrictions on root
673398 - request for additional pam_cracklib checks
723297 - limits.conf should mention limits.d directory
746619 - CVE-2011-3148 pam (pam_env): Stack-based buffer overflow by parsing user's pam_environment file
746620 - CVE-2011-3149 pam (pam_env): Infinite loop by expanding certain arguments
750601 - pam_namespace cannot verify status of SELinux in MLS
811168 - fix pam_get_authtok_verify() to respect the authtok_type= option
811243 - pam_cracklib: difignore is no-op in the current package - needs man page update
815516 - pam remember can check wrong username if it is a substring of another username


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/