Colin Watson cjwatson at ubuntu.com
Mon Nov 21 06:20:03 CST 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 21 Nov 2005 12:15:44 +0000
Source: pam
Binary: libpam0g-dev libpam0g libpam-modules libpam-doc libpam-runtime libpam-cracklib
Architecture: source
Version: 0.79-3ubuntu1
Distribution: dapper
Urgency: low
Maintainer: Sam Hartman <hartmans at debian.org>
Changed-By: Colin Watson <cjwatson at ubuntu.com>
Description: 
 libpam-cracklib - PAM module to enable cracklib support.
 libpam-doc - Documentation of PAM
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam-runtime - Runtime support for the PAM library
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 165068 248310 248928 249499 259634 277633 284954 295296 300775 319026 323982 327876 330097 330458 330829 330852
Changes: 
 pam (0.79-3ubuntu1) dapper; urgency=low
 .
   * Resynchronise with Debian.
 .
 pam (0.79-3) unstable; urgency=low
 .
   * Patch 059
     - Fix a segfault in pam_userdb when the new "crypt=" option
       is unset, as will be the case for all existing users; already fixed
       upstream.  Closes: #330829.
     - Fix a memory leak in the same code due to gratuitous strdup()s.
   * Further regression in pam_env: don't treat a missing /etc/environment
     as a fatal error, either.  Amend patch 058 accordingly.  Closes: #330852.
 .
 pam (0.79-2) unstable; urgency=low
 .
   The ".c.o: rm -rf $@" release
   * Fix debian/rules so that make clean doesn't remove ./configure when the
     timestamp on configure.in is newer (!).
   * Switch pam_userdb from db3 to db4.2, which according to the libdb
     maintainers should require no manual intervention for upgrading on-disk
     database formats.  Closes: #165068.
   * Patch 058:  yes, of course we want to read /etc/environment by
     default.  Grr!  Revert upstream change which disables this for no
     apparent reason (closes: #330458).
   * Tweak selinux rootok code to use the version of the function call that
     doesn't pollute namespace
 .
 pam (0.79-1) unstable; urgency=low
 .
   * New upstream version (closes: #284954, #300775).
     - includes some fixes for typos (closes: #319026).
     - pam_unix should now be LSB 3.0-compliant (closes: #323982).
     - fixes segfaults in libpam on config file syntax errors
       (closes: #330097).
   * Drop patches 000_bootstrap, 004_libpam_makefile_static_works,
     011_pam_access, 013_pam_filter_termio_to_termios, 017_misc_fixes,
     025_pam_group_conffile_name, 028_pam_mail_delete_only_when_set,
     033_use_gcc_not_ld, 034_pam_dispatch_ignore_PAM_IGNORE,
     035_pam_unix_security, 039_pam_mkhomedir_no_maxpathlen_required,
     041_call_bootstrap, 042_pam_mkhomedir_dest_not_source_for_errors,
     051_32_bit_pam_lastlog_ll_time, and
     053_pam_unix_user_known_returns_user_unknown which have been
     integrated upstream.
   * Merge one last bit of patch 053 into patch 043, where it should have
     been in the first place
   * Patch 057: SELinux support:
     - add support to pam_unix for copying SELinux security contexts when
       writing out new passwd/shadow files and creating lockfiles
     - support calling unix_chkpwd if opening /etc/shadow fails due to
       SELinux permissions
     - allow unix_chkpwd to authenticate for any user when in an SELinux
       context (hurray!); we depend on SELinux policies to prevent the
       helper's use as a brute force tool
     - also support querying user expiration info via unix_chkpwd
     - misc cleanup: clean up file descriptors when invoking unix_chkpwd
       (closes: #248310)
     - make pam_rootok check the SELinux passwd class permissions, not just
       the uid
     - add new pam_selinux module (closes: #249499)
   * Build-depend on libselinux1-dev.
   * Fix pam_getenv, so that it can read the actual format of /etc/environment
     instead of trying to read it using the syntax of
     /etc/security/pam_env.conf; thanks to Colin Watson for the patch.
     Closes: #327876.
   * Set LC_COLLATE=C when using alphabetic range expressions in
     debian/rules; bah, so *that's* what kept happening to my README file
     when trying to build out of svn!  Closes: #295296.
   * Add a reference to the text of the GPL to debian/copyright.
 .
 pam (0.76-23) unstable; urgency=low
 .
   * Fix Gcc 3.4 compilation, Closes: #259634
   * Note that pam.conf is not read if /etc/pam.d exists, Closes: #248928
   * Fix typo in pam_env.conf, Closes: #277633
Files: 
 d7d7e52cd0a61f9ca58a6c64c1cd7ec3 951 base optional pam_0.79-3ubuntu1.dsc
 e33cc6e6fd86b01d0a44ec3232a2fb74 491964 base optional pam_0.79.orig.tar.gz
 2ae3c37faa55399fcce0e40f341d5072 128677 base optional pam_0.79-3ubuntu1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDgbrv9t0zAhD6TNERAmTLAJ9HtYSpBNLQ5byfcxf0zHkmNdFIgACcDwCt
rH44VYMpOosAPKFpEM425+M=
=6Qoq
-----END PGP SIGNATURE-----


Accepted:
pam_0.79-3ubuntu1.diff.gz
  to pool/main/p/pam/pam_0.79-3ubuntu1.diff.gz
pam_0.79-3ubuntu1.dsc
  to pool/main/p/pam/pam_0.79-3ubuntu1.dsc
pam_0.79.orig.tar.gz
  to pool/main/p/pam/pam_0.79.orig.tar.gz




More information about the dapper-changes mailing list