Branches for Maverick

Name Status Last Modified Last Commit
lp:ubuntu/maverick/pam bug 2 Mature 2011-03-09 20:30:56 UTC 2011-03-09
67. * Merge from Debian unstable, remaini...

Author: Steve Langasek
Revision Date: 2010-08-16 19:12:35 UTC

* Merge from Debian unstable, remaining changes:
  - debian/libpam-modules.postinst: Add PATH to /etc/environment if it's
    not present there or in /etc/security/pam_env.conf. (should send to
    Debian).
  - debian/libpam0g.postinst: only ask questions during update-manager when
    there are non-default services running.
  - debian/patches-applied/series: Ubuntu patches are as below ...
  - debian/patches-applied/ubuntu-rlimit_nice_correction: Explicitly
    initialise RLIMIT_NICE rather than relying on the kernel limits.
  - Change Vcs-Bzr to point at the Ubuntu branch.
  - Make libpam-modules depend on base-files (>= 5.0.0ubuntu6), to ensure
    run-parts does the right thing in /etc/update-motd.d.
  - debian/patches-applied/pam_motd-legal-notice: display the contents of
    /etc/legal once, then set a flag in the user's homedir to prevent
    showing it again.
  - debian/update-motd.5, debian/libpam-modules.manpages: add a manpage
    for update-motd, with some best practices and notes of explanation.
  - debian/patches/update-motd-manpage-ref: add a reference in pam_motd(8)
    to update-motd(5)

lp:ubuntu/maverick-proposed/pam bug 2 Mature 2011-05-04 00:24:18 UTC 2011-05-04
69. debian/patches-applied/update-motd: s...

Author: Dustin Kirkland 
Revision Date: 2011-05-03 07:58:52 UTC

debian/patches-applied/update-motd: santize the environment before
calling run-parts, LP: #610125

lp:ubuntu/maverick-security/pam bug 2 Mature 2011-10-24 19:24:28 UTC 2011-10-24
71. * SECURITY UPDATE: possible code exec...

Author: Marc Deslauriers
Revision Date: 2011-10-18 10:05:50 UTC

* SECURITY UPDATE: possible code execution via incorrect environment file
  parsing (LP: #874469)
  - debian/patches-applied/CVE-2011-3148.patch: correctly count leading
    whitespace when parsing environment file in modules/pam_env/pam_env.c.
  - CVE-2011-3148
* SECURITY UPDATE: denial of service via overflowed environment variable
  expansion (LP: #874565)
  - debian/patches-applied/CVE-2011-3149.patch: when overflowing, exit
    with PAM_BUF_ERR in modules/pam_env/pam_env.c.
  - CVE-2011-3149
* SECURITY UPDATE: code execution via incorrect environment cleaning
  - debian/patches-applied/update-motd: updated to use clean environment
    and absolute paths in modules/pam_motd/pam_motd.c.
  - CVE-2011-XXXX

lp:ubuntu/maverick-updates/pam 2 Mature 2011-10-18 10:05:50 UTC 2011-10-18
71. * SECURITY UPDATE: possible code exec...

Author: Marc Deslauriers
Revision Date: 2011-10-18 10:05:50 UTC

* SECURITY UPDATE: possible code execution via incorrect environment file
  parsing (LP: #874469)
  - debian/patches-applied/CVE-2011-3148.patch: correctly count leading
    whitespace when parsing environment file in modules/pam_env/pam_env.c.
  - CVE-2011-3148
* SECURITY UPDATE: denial of service via overflowed environment variable
  expansion (LP: #874565)
  - debian/patches-applied/CVE-2011-3149.patch: when overflowing, exit
    with PAM_BUF_ERR in modules/pam_env/pam_env.c.
  - CVE-2011-3149
* SECURITY UPDATE: code execution via incorrect environment cleaning
  - debian/patches-applied/update-motd: updated to use clean environment
    and absolute paths in modules/pam_motd/pam_motd.c.
  - CVE-2011-XXXX

14 of 4 results