8993 Security update for pam_pkcs11 moderate openSUSE Leap 15.0 Update This update for pam_pkcs11 fixes the following security issues: - It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012) - Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012) - Memory not cleaned properly before free() (bsc#1105012) This non-security issue was fixed: - Fix segfault and fetch problems when checking CRLs This update was imported from the SUSE:SLE-15:Update update project. pam_pkcs11-0.6.9-lp150.2.3.1.src.rpm pam_pkcs11-0.6.9-lp150.2.3.1.x86_64.rpm pam_pkcs11-debuginfo-0.6.9-lp150.2.3.1.x86_64.rpm pam_pkcs11-debugsource-0.6.9-lp150.2.3.1.x86_64.rpm pam_pkcs11-devel-doc-0.6.9-lp150.2.3.1.x86_64.rpm pam_pkcs11-0.6.9-lp150.2.3.1.i586.rpm pam_pkcs11-32bit-0.6.9-lp150.2.3.1.x86_64.rpm pam_pkcs11-32bit-debuginfo-0.6.9-lp150.2.3.1.x86_64.rpm pam_pkcs11-debuginfo-0.6.9-lp150.2.3.1.i586.rpm pam_pkcs11-debugsource-0.6.9-lp150.2.3.1.i586.rpm pam_pkcs11-devel-doc-0.6.9-lp150.2.3.1.i586.rpm