-
Bug
-
Resolution: Done-Errata
-
Major
-
rhel-9.3.0
-
pam-1.5.1-16.el9
-
None
-
Moderate
-
rhel-sst-idm-sssd
-
ssg_idm
-
11
-
12
-
0
-
False
-
-
No
-
None
-
Pass
-
Automated
-
If docs needed, set a value
-
-
Unspecified
-
None
Description of problem:
It was found that pam_faillock is making bad audit events. Seems to be this way a while. But recently found that it can mislead ausearch to associate the wrong name to uid. The fix is to change uid to suid. There is a patch here that upstream recently accepted:
https://github.com/linux-pam/linux-pam/pull/591
This should be applied as soon as possible, because once the event is created wrong, it's that way forever.
- is cloned by
-
RHEL-28620 [RHEL8 0day] pam_faillock audit events duplicate uid
- Closed
- external trackers
- links to
-
RHBA-2023:123902 pam bug fix and enhancement update
- mentioned on
(1 mentioned on)