Accepted pam 0.79-4ubuntu1 (source)
Colin Watson
cjwatson at ubuntu.com
Tue Dec 19 11:40:20 GMT 2006
Accepted:
OK: pam_0.79-4ubuntu1.dsc
-> Component: main Section: libs
OK: pam_0.79-4ubuntu1.diff.gz
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 19 Dec 2006 10:32:47 +0000
Source: pam
Binary: libpam0g-dev libpam0g libpam-modules libpam-doc libpam-runtime libpam-cracklib
Architecture: source
Version: 0.79-4ubuntu1
Distribution: feisty
Urgency: medium
Maintainer: Sam Hartman <hartmans at debian.org>
Changed-By: Colin Watson <cjwatson at ubuntu.com>
Description:
libpam-cracklib - PAM module to enable cracklib support
libpam-doc - Documentation of PAM
libpam-modules - Pluggable Authentication Modules for PAM
libpam-runtime - Runtime support for the PAM library
libpam0g - Pluggable Authentication Modules library
libpam0g-dev - Development files for PAM
Closes: 122400 149027 149883 241663 313542 313588 318452 327272 335273 352329 360657 388431
Changes:
pam (0.79-4ubuntu1) feisty; urgency=low
.
* Resynchronise with Debian. Remaining changes:
- Patch 100 (renumbered from 060): Look at ~/.pam_environment too, with
the same format as /etc/security/pam_env.conf.
- Patch 101 (renumbered from 061): Explicitly initialise RLIMIT_NICE
rather than relying on the kernel limits. Bound RLIMIT_NICE from below
as well as from above. Fix off-by-one error when converting
RLIMIT_NICE to the range of values used by the kernel.
- Add PATH to /etc/environment if it's not present there or in
/etc/security/pam_env.conf.
- debian/rules: Fix a bashism.
- Install unix_chkpwd setgid shadow instead of setuid root. The nis
package handles overriding this as necessary.
- Use pam_foreground in the default session.
- Linux-PAM/libpamc/test/regress/test.libpamc.c: Use standard u_int8_t
type rather than __u8.
.
pam (0.79-4) unstable; urgency=medium
.
* Medium-urgency upload; at least one RC bugfix, but also a
significant number of changes, hence not urgency=high.
* Move libpam-modules and libpam0g to Section: libs and libpam-runtime
to section: admin, to match the overrides in the archive.
* Move old changelog entries (well, entry) that don't follow the current
format to debian/changelog.old, since there's no way to figure out a
timestamp for an 8-year-old upload, and this is the most effective
way to clear a glut of lintian warnings.
* Fix the formatting of the libpam-cracklib package description.
* Patch 010: remove parts of the patch that aren't necessary for C++
compatibility.
* Patch 060: fix a segfault in pam_tally caused by misuse of
pam_get_data(); already fixed upstream. Closes: #335273.
* Patch 061: fix a double free in pam_issue, caused by overuse (and misuse)
of strdup (similar to patch 059). Already fixed upstream.
Closes: #327272.
* Don't build-depend on libselinux1-dev and libcap-dev on kfreebsd archs.
Closes: #352329.
* Patch 005: sync pam_limits with upstream:
- support "-" (unlimited) for all limit types except process priority.
- support the additional aliases "-1", "unlimited", and "infinity" for
clearing the limits; closes: #122400, #149027.
- restrict the range of process priority, login count, and system login
count settings to (INT_MIN,INT_MAX) (heh).
- special-case RLIM_INFINITY when applying multipliers to values from
the config.
- document maxsyslogins in the default limits.conf; closes: #149883.
- use the current process priority as a default instead of resetting to
0; closes: #241663.
- add support for (and document) new RLIMIT_NICE and RLIMIT_RTPRIO
settings in Linux 2.6.12 and above; closes: #313542, #313588.
- allow imposing limits on uid=0.
* Patch 027: only set RLIM_INFINITY as the default for the limits where
we know this is sensible, so that recompiling in an environment with new
limits doesn't create a security hole -- as happened with RLIMIT_NICE and
RLIMIT_RTPRIO! Thanks to Ville Hallik for the initial patch.
Closes: #388431.
* Patch 029, 047: Fix up the broken pam_limits capabilities patch so it
actually works -- which may well be a first... Closes: #318452.
.
pam (0.79-3.2) unstable; urgency=low
.
* Non-maintainer upload to fix important bug, that makes passwd segfault
when CTRL-D is pressed at the password prompt. Applied the patch
provided by Dann Frazier. (Closes: #360657)
Files:
2ac7c5b21ce7108dd415cad7389c158e 984 libs optional pam_0.79-4ubuntu1.dsc
48b8ca89f7968f7287f5af8ac2a81038 140879 libs optional pam_0.79-4ubuntu1.diff.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFh8KA9t0zAhD6TNERAqTpAJ9r+TVTVgAJES5Bz2aU9nEoTwMuhQCfYXpA
GwnIhkqu3fDjiVJ2DrEx8U0=
=yufu
-----END PGP SIGNATURE-----
More information about the feisty-changes
mailing list