Bugtraq mailing list archives
Re: pam_limits.so Bug!!
From: Solar Designer <solar () openwall com>
Date: Tue, 9 Oct 2001 09:10:27 +0400
On Mon, Oct 08, 2001 at 04:52:57PM +0300, Devrim SERAL wrote: Several people(*) have contributed to investigating this issue during the past month. It is an util-linux login bug, not a pam_limits one. You should expect a fixed util-linux package soon. (*) Nalin Dahyabhai, Andreas Hasenack, Rafal Wojtczuk, Olaf Kirch, and me. Openwall GNU/*/Linux is not affected and never was. We don't use that login. :-)
Devrim SERAL wrote:Hi , Today i found some interesting bug when i tried to use pam_limits.so in login pam configuration. Today one of my user warn me that when he log on the our Linux server he gain my rights. Firstly i think someone break our system. But when i checked all logs i didn't found any break sign. Then i think xinetd or in.telnetd have some bug. I checked all updates from redhat and found that we are on lastest patch level at all packets.. Next i have disable telnetd from xinetd to all Lan and only permit to access from my IP number. And check all possibility. Finally i found that only student groups member gain console or pts/0 rights.. And i remember at weekend i have changed /etc/security/limits.conf for limit our student maxlogin count to two. Only i added below line to this file: @student hard maxlogins 2 And also added below line to pam configuration of login: session required pam_limits.so When i comment pam_limits.so related line the problem solved.. I wonder that if its related only for our server or pam module specific? devrim Note: The server run on Redhat 7.1 Kernel 2.4.10 and all packets at lastest patch level.
-- /sd
Current thread:
- pam_limits.so Bug!! Devrim SERAL (Oct 08)
- Re: pam_limits.so Bug!! Solar Designer (Oct 09)