Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-24732: auth/pam: Check for account/password expiry · foxcpp/maddy@7ee6a39

Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.

CVE
#redis

@@ -1,3 +1,23 @@

//+build libpam

/*

Maddy Mail Server - Composable all-in-one email server.

Copyright © 2019-2022 Max Mazurov [email protected], Maddy Mail Server contributors

This program is free software: you can redistribute it and/or modify

it under the terms of the GNU General Public License as published by

the Free Software Foundation, either version 3 of the License, or

(at your option) any later version.

This program is distributed in the hope that it will be useful,

but WITHOUT ANY WARRANTY; without even the implied warranty of

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the

GNU General Public License for more details.

You should have received a copy of the GNU General Public License

along with this program. If not, see https://www.gnu.org/licenses/.

*/

#define _POSIX_C_SOURCE 200809L

#include <stdio.h>

#include <stdlib.h>

@@ -46,6 +66,19 @@ struct error_obj run_pam_auth(const char *username, char *password) {

return ret_val;

}

status = pam_acct_mgmt(local_auth, PAM_SILENT|PAM_DISALLOW_NULL_AUTHTOK);

if (status != PAM_SUCCESS) {

struct error_obj ret_val;

if (status == PAM_AUTH_ERR || status == PAM_USER_UNKNOWN || status == PAM_NEW_AUTHTOK_REQD) {

ret_val.status = 1;

} else {

ret_val.status = 2;

}

ret_val.func_name = "pam_acct_mgmt";

ret_val.error_msg = pam_strerror(local_auth, status);

return ret_val;

}

status = pam_end(local_auth, status);

if (status != PAM_SUCCESS) {

struct error_obj ret_val;

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907