8993 Security update for pam_pkcs11 moderate openSUSE Leap 15.0 Update ports This update for pam_pkcs11 fixes the following security issues: - It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012) - Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012) - Memory not cleaned properly before free() (bsc#1105012) This non-security issue was fixed: - Fix segfault and fetch problems when checking CRLs This update was imported from the SUSE:SLE-15:Update update project. pam_pkcs11-0.6.9-lp150.2.3.1.aarch64.rpm pam_pkcs11-debuginfo-0.6.9-lp150.2.3.1.aarch64.rpm pam_pkcs11-debugsource-0.6.9-lp150.2.3.1.aarch64.rpm pam_pkcs11-devel-doc-0.6.9-lp150.2.3.1.aarch64.rpm pam_pkcs11-0.6.9-lp150.2.3.1.armv7hl.rpm pam_pkcs11-debuginfo-0.6.9-lp150.2.3.1.armv7hl.rpm pam_pkcs11-debugsource-0.6.9-lp150.2.3.1.armv7hl.rpm pam_pkcs11-devel-doc-0.6.9-lp150.2.3.1.armv7hl.rpm pam_pkcs11-0.6.9-lp150.2.3.1.ppc64le.rpm pam_pkcs11-debuginfo-0.6.9-lp150.2.3.1.ppc64le.rpm pam_pkcs11-debugsource-0.6.9-lp150.2.3.1.ppc64le.rpm pam_pkcs11-devel-doc-0.6.9-lp150.2.3.1.ppc64le.rpm