5860165 2000-12-13 17:44 -0200  /85 rader/  <secure@CONECTIVA.COM.BR>
Sänt av: joel@lysator.liu.se
Importerad: 2000-12-14  20:54  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: secure@CONECTIVA.COM.BR
Mottagare: Bugtraq (import) <14212>
Ärende: [CLA-2000:358] Conectiva Linux Security Announcement - pam
------------------------------------------------------------
From: secure@CONECTIVA.COM.BR
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <200012131944.RAA30493@frajuto.distro.conectiva>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- -----------------------------------------------------------------------

PACKAGE   : pam
SUMMARY   : Buffer overflow in pam_localuser
DATE      : 2000-12-13 17:42:00
ID        : CLA-2000:358
RELEVANT
RELEASES  : 4.0, 4.0es, 4.1, 4.2, 5.0, 5.1, 6.0

- ----------------------------------------------------------------------

DESCRIPTION
 The pam_localuser module, part of the PAM package, has a buffer
 overflow vulnerability in it. This module is *not* used in any
 default configuration and to be vulnerable an user would have to
 insert it manually in a configuration file in the /etc/pam.d
 directory.


SOLUTION
 All users of the pam_localuser module should upgrade.


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/4.0/SRPMS/pam-0.72-23cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.0/i386/pam-0.72-23cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.0es/SRPMS/pam-0.72-23cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.0es/i386/pam-0.72-23cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/pam-0.72-23cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.1/i386/pam-0.72-23cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/pam-0.72-23cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.2/i386/pam-0.72-23cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/pam-0.72-23cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/pam-0.72-23cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/pam-0.72-23cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/pam-0.72-23cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/pam-0.72-23cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/pam-0.72-23cl.i386.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform
 upgrades:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples
 can be found at
 http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- ----------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key can be
obtained at http://www.conectiva.com.br/contato

- -----------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://www.conectiva.com.br/suporte/atualizacoes

- ----------------------------------------------------------------------
subscribe: atualizacoes-anuncio-subscribe@papaleguas.conectiva.com.br
unsubscribe: atualizacoes-anuncio-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6N9GE42jd0JmAcZARAniRAKCrNrTjKkAqCGRtvnbzAw9ewKPfYwCfU5q5
RUCdr4rVEgoqB1qZaSIZugM=
=Zc7t
-----END PGP SIGNATURE-----
(5860165) --------------------------------(Ombruten)