Opened 23 months ago
Closed 23 months ago
#19142 closed enhancement (fixed)
Linux-PAM-1.6.0
| Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
|---|---|---|---|
| Priority: | elevated | Milestone: | 12.1 |
| Component: | BOOK | Version: | git |
| Severity: | normal | Keywords: | |
| Cc: |
Description
New minor version.
Change History (6)
follow-up: 2 comment:1 by , 23 months ago
| Priority: | normal → elevated |
|---|
comment:2 by , 23 months ago
Replying to Douglas R. Reno:
Fixes a CVE in pam_namespace.so: CVE-2024-22365. It appears to be a local denial of service, rated at Medium
BLFS pam configuration does not use it anyway. It is referred in the /etc/pam.d/systemd-user file shipped by systemd but we are recreating it.
comment:3 by , 23 months ago
| Owner: | changed from to |
|---|---|
| Status: | new → assigned |
comment:4 by , 23 months ago
Noteworthy changes in Linux-PAM 1.6.0
Added support of configuration files with arbitrarily long lines.
build: fixed build outside of the source tree.
libpam: added use of getrandom(2) as a source of randomness if available.
libpam: fixed calculation of fail delay with very long delays.
libpam: fixed potential infinite recursion with includes.
libpam: implemented string to number conversions validation when parsing
controls in configuration.
pam_access: added quiet_log option.
pam_access: fixed truncation of very long group names.
pam_canonicalize_user: new module to canonicalize user name.
pam_echo: fixed file handling to prevent overflows and short reads.
pam_env: added support of '' character in environment variable values.
pam_exec: allowed expose_authtok for password PAM_TYPE.
pam_exec: fixed stack overflow with binary output of programs.
pam_faildelay: implemented parameter ranges validation.
pam_listfile: changed to treat \r and \n exactly the same in configuration.
pam_mkhomedir: hardened directory creation against timing attacks.
Please note that using *at functions leads to more open file handles
during creation.
pam_namespace: fixed potential local DoS (CVE-2024-22365).
pam_nologin: fixed file handling to prevent short reads.
pam_pwhistory: helper binary is now built only if SELinux support is enabled.
pam_pwhistory: implemented reliable usernames handling when remembering
passwords.
pam_shells: changed to allow shell entries with absolute paths only.
pam_succeed_if: fixed treating empty strings as numerical value 0.
pam_unix: added support of disabled password aging.
pam_unix: synchronized password aging with shadow.
pam_unix: implemented string to number conversions validation.
pam_unix: fixed truncation of very long user names.
pam_unix: corrected rounds retrieval for configured encryption method.
pam_unix: implemented reliable usernames handling when remembering passwords.
pam_unix: changed to always run the helper to obtain shadow password entries.
pam_unix: unix_update helper binary is now built only if SELinux support
is enabled.
pam_unix: added audit support to unix_update helper.
pam_userdb: added gdbm support.
Multiple minor bug fixes, portability fixes, documentation improvements,
and translation updates.
It looks like we'll need to drop unix_update and pwhistory_helper from the installed files and descriptions since they now need SELinux
comment:5 by , 23 months ago
The release notes seem to be incorrect on that. I don't have anything relating to selinux support in my log other than:
checking for getfilecon in -lselinux... no
which makes sense, we don't have SELinux, but I still have:
renodr [ /sources/Linux-PAM-1.6.0/install ]$ ls -l usr/sbin total 412 -rwxr-xr-x 1 root root 54624 Jan 18 13:34 faillock -rwxr-xr-x 1 root root 35128 Jan 18 13:34 mkhomedir_helper -rwxr-xr-x 1 root root 467 Jan 18 13:34 pam_namespace_helper -rwxr-xr-x 1 root root 32216 Jan 18 13:34 pam_timestamp_check -rwxr-xr-x 1 root root 52456 Jan 18 13:34 pwhistory_helper -rwxr-xr-x 1 root root 115336 Jan 18 13:34 unix_chkpwd -rwxr-xr-x 1 root root 116288 Jan 18 13:34 unix_update
Running these programs just says "This binary is not designed for running in this way", but since it seems to be normal I will leave them in.
comment:6 by , 23 months ago
| Resolution: | → fixed |
|---|---|
| Status: | assigned → closed |
Fixed at 3c1cfcf75a9b4c7fced7a57bbe2947805d1db57d
SA-12.0-073 issued, with a note that a normal BLFS system is not affected unless the user has added pam_namespace.so into their configuration.

Fixes a CVE in pam_namespace.so: CVE-2024-22365. It appears to be a local denial of service, rated at Medium