Accepted pam 0.79-4ubuntu1 (source)

Colin Watson cjwatson at ubuntu.com
Tue Dec 19 11:40:20 GMT 2006


Accepted:
 OK: pam_0.79-4ubuntu1.dsc
     -> Component: main Section: libs
 OK: pam_0.79-4ubuntu1.diff.gz

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 19 Dec 2006 10:32:47 +0000
Source: pam
Binary: libpam0g-dev libpam0g libpam-modules libpam-doc libpam-runtime libpam-cracklib
Architecture: source
Version: 0.79-4ubuntu1
Distribution: feisty
Urgency: medium
Maintainer: Sam Hartman <hartmans at debian.org>
Changed-By: Colin Watson <cjwatson at ubuntu.com>
Description: 
 libpam-cracklib - PAM module to enable cracklib support
 libpam-doc - Documentation of PAM
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam-runtime - Runtime support for the PAM library
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 122400 149027 149883 241663 313542 313588 318452 327272 335273 352329 360657 388431
Changes: 
 pam (0.79-4ubuntu1) feisty; urgency=low
 .
   * Resynchronise with Debian. Remaining changes:
     - Patch 100 (renumbered from 060): Look at ~/.pam_environment too, with
       the same format as /etc/security/pam_env.conf.
     - Patch 101 (renumbered from 061): Explicitly initialise RLIMIT_NICE
       rather than relying on the kernel limits. Bound RLIMIT_NICE from below
       as well as from above. Fix off-by-one error when converting
       RLIMIT_NICE to the range of values used by the kernel.
     - Add PATH to /etc/environment if it's not present there or in
       /etc/security/pam_env.conf.
     - debian/rules: Fix a bashism.
     - Install unix_chkpwd setgid shadow instead of setuid root. The nis
       package handles overriding this as necessary.
     - Use pam_foreground in the default session.
     - Linux-PAM/libpamc/test/regress/test.libpamc.c: Use standard u_int8_t
       type rather than __u8.
 .
 pam (0.79-4) unstable; urgency=medium
 .
   * Medium-urgency upload; at least one RC bugfix, but also a
     significant number of changes, hence not urgency=high.
   * Move libpam-modules and libpam0g to Section: libs and libpam-runtime
     to section: admin, to match the overrides in the archive.
   * Move old changelog entries (well, entry) that don't follow the current
     format to debian/changelog.old, since there's no way to figure out a
     timestamp for an 8-year-old upload, and this is the most effective
     way to clear a glut of lintian warnings.
   * Fix the formatting of the libpam-cracklib package description.
   * Patch 010: remove parts of the patch that aren't necessary for C++
     compatibility.
   * Patch 060: fix a segfault in pam_tally caused by misuse of
     pam_get_data(); already fixed upstream.  Closes: #335273.
   * Patch 061: fix a double free in pam_issue, caused by overuse (and misuse)
     of strdup (similar to patch 059).  Already fixed upstream.
     Closes: #327272.
   * Don't build-depend on libselinux1-dev and libcap-dev on kfreebsd archs.
     Closes: #352329.
   * Patch 005: sync pam_limits with upstream:
     - support "-" (unlimited) for all limit types except process priority.
     - support the additional aliases "-1", "unlimited", and "infinity" for
       clearing the limits; closes: #122400, #149027.
     - restrict the range of process priority, login count, and system login
       count settings to (INT_MIN,INT_MAX) (heh).
     - special-case RLIM_INFINITY when applying multipliers to values from
       the config.
     - document maxsyslogins in the default limits.conf; closes: #149883.
     - use the current process priority as a default instead of resetting to
       0; closes: #241663.
     - add support for (and document) new RLIMIT_NICE and RLIMIT_RTPRIO
       settings in Linux 2.6.12 and above; closes: #313542, #313588.
     - allow imposing limits on uid=0.
   * Patch 027: only set RLIM_INFINITY as the default for the limits where
     we know this is sensible, so that recompiling in an environment with new
     limits doesn't create a security hole -- as happened with RLIMIT_NICE and
     RLIMIT_RTPRIO!  Thanks to Ville Hallik for the initial patch.
     Closes: #388431.
   * Patch 029, 047: Fix up the broken pam_limits capabilities patch so it
     actually works -- which may well be a first...  Closes: #318452.
 .
 pam (0.79-3.2) unstable; urgency=low
 .
   * Non-maintainer upload to fix important bug, that makes passwd segfault
     when CTRL-D is pressed at the password prompt.  Applied the patch
     provided by Dann Frazier.  (Closes: #360657)
Files: 
 2ac7c5b21ce7108dd415cad7389c158e 984 libs optional pam_0.79-4ubuntu1.dsc
 48b8ca89f7968f7287f5af8ac2a81038 140879 libs optional pam_0.79-4ubuntu1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFh8KA9t0zAhD6TNERAqTpAJ9r+TVTVgAJES5Bz2aU9nEoTwMuhQCfYXpA
GwnIhkqu3fDjiVJ2DrEx8U0=
=yufu
-----END PGP SIGNATURE-----





More information about the feisty-changes mailing list