| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
| |
In other words, allow files without a newline at the end. (LP: #1953201)
|
|
|
|
|
| |
avoid crypt_checksalt because pre-bullseye password hashes were
ignored.
|
|
|
|
|
| |
It turns out Debian uses DEFAULT_MODULE_PATH and _PAM_ISA in the opposite meaning of upstream. DEFAULT_MODULE_PATH is based on libdir, which is the multiarch path, while _PAM_ISA is /lib/security.
So my patch had the opposite effect as intended.
|
|
|
|
|
| |
debian/patches-applied/lib_security_multiarch_compat: Prefer _PAM_ISA
to DEFAULT_MODULE_PATH.
|
|
|
|
|
|
| |
* debian/patches-applied/lib_security_multiarch_compat
- Fix regression introduced in 1.4.0-1: search both /lib/security and
/lib/[multiarch]/security/], Closes: #990790
|
|
|
|
|
|
|
|
|
|
|
| |
directory before opendir
According to https://bugs.debian.org/834589 there are cases where the
kernel will not permit opendir before stat of the enclosing directory.
In the described case it was autofs, but I can see various filesystems
that mount a network namespace doing the same thing trying to prevent
excessive network traffic from a tree traversal. Statting the autofs
entry before opendir causes it to work.
|
|
|
|
|
|
| |
to Create /run/faillock when needed. Fedora used to do this with
tmpfiles, but we don't want to do that because it is systemd
dependent.
|
|
|
|
| |
before password expire, Closes: #980285
|
|
|
|
| |
a deprecated alias for nullok.
|
| |
|
|
|
|
| |
#674857, #936071.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
also, reorder patches so that all doc rebuilds get the standard locale
setting.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
pam (1.1.8-3.6) unstable; urgency=medium
* Non-maintainer upload.
* cve-2015-3238.patch: Add the changes in the generated pam_exec.8
and pam_unix.8 in addition to (and after) the changes to the
source .xml files. This avoids unwanted rebuilds that can cause
problems due to differing files on different architectures of
the Multi-Arch: same libpam-modules. (Closes: #851545)
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
pam (1.1.8-3.3) unstable; urgency=low
* Non-maintainer upload.
[ Steve Langasek ]
* Updated Swedish translation to correct a typo, thanks to Anders Jonsson
and Martin Bagge. Closes: #743875
* Updated Turkish translation, thanks to Mert Dirik <mertdirik@gmail.com>.
(closes: #756756)
* d/applied-patches/pam-limits-nofile-fd-setsize-cap: cap the default
soft nofile limit read from pid 1 to FD_SETSIZE. Thanks to Robie Basak
<robie.basak@ubuntu.com> for the patch. Closes: #783105.
* Acknowledge security NMU.
* pam-auth-update: don't mishandle trailing whitespace in profiles.
LP: #1487103.
[ Laurent Bigonville ]
* debian/control: Fix Vcs-* and Homepage fields (Closes: #752343)
* debian/watch: Update watch file and point it to http://www.linux-pam.org
* debian/patches-applied/pam_namespace_fix_bashism.patch: Fix bashism in
namespace.init script (Closes: #624842)
* debian/control: Build-depends against debhelper (>= 9) to match the
defined debhelper compatibility
* Rename the cve-2011-4708.patch to cve-2010-4708.patch to match reality,
thanks to Jakub Wilk <jwilk@debian.org> for noticing (Closes: #761594)
* debian/control: Bump Standards-Version to 3.9.8 (no further changes)
* debian/libpam-doc.doc-base.applications-guide: Fix spelling
* debian/libpam0g-dev.examples: Do not use shell brace expansion
* debian/patches-applied/pam-loginuid-in-containers: Updated with the version
from Ubuntu, this should fix logins in containers (Closes: #726661)
* debian/patches-applied/update-motd: Updated with the version from Ubuntu:
use /run/motd.dynamic instead of /var/run/motd, nothing in the archive
uses the later (Closes: #743286)
* debian/patches-applied/make_documentation_reproducible.patch: Make the
build reproducible, removes differences when building with different
locale values (Closes: #792127)
|
| |
| |
| |
| |
| | |
soft nofile limit read from pid 1 to FD_SETSIZE. Thanks to Robie Basak
<robie.basak@ubuntu.com> for the patch. Closes: #783105.
|
| |
| |
| |
| |
| |
| |
| |
| | |
pam (1.1.8-3.2) unstable; urgency=medium
* Non-maintainer upload.
* Fix CVE-2015-3238: DoS/user enumeration due to blocking pipe in pam_unix
module (Closes: #789986)
|
|/
|
|
|
|
|
|
|
|
| |
pam (1.1.8-3.1) unstable; urgency=high
* Non-maintainer upload by the Security Team.
* Fix CVE-2013-7041: case-insensitive comparison used for verifying
passwords in the pam_userdb module (closes: #731368).
* Fix CVE-2014-2583: multiple directory traversal issues in the
pam_timestamp module (closes: 757555)
|
|
|
|
| |
install
|
| |
|
|
|
|
| |
so that regenerating documentation doesn't cause build skew.
|
| |
|
| |
|
|
|
|
| |
upstream with a newer, fixed xsltproc.
|
| |
|
|
|
|
| |
Ignore failure in user namespaces.
|
|
|
|
|
| |
which will let us keep up-to-date with newer autotools. In the present
instance, this gets us aarch64 support.
|
| |
|
|
|
|
|
| |
include causing build failure with eglibc 2.16. Thanks to Daniel
Schepler <dschepler@gmail.com>. Closes: #693450.
|
|
|
|
| |
from the previous security upload. Closes: #693995.
|
| |
|
|
|
|
|
| |
'noupdate', which suppresses the call to run-parts /etc/update-motd.d.
LP: #805423.
|
|
|
|
|
| |
run-parts, and restore the old mask afterwards, so /run/motd gets
consistent permissions. LP: #871943.
|
|
|
|
|
|
| |
setre*id() calls; we know that there are situations where some of these
may fail but we don't care. As long as the last setre*id() call in each
set succeeds, that's the state we mean to be in.
|
|
|
|
|
|
| |
in environment file parsing (CVE-2011-3148).
* debian/patches-applied/pam_env-fix-dos.patch: fix DoS in environment
file parsing (CVE-2011-3149).
|
|
|
|
| |
building motd.
|
| |
|
|
|
|
| |
drop unneeded no-op change to reduce delta from upstream.
|
|
|
|
|
|
| |
debian/patches-applied/026_pam_unix_passwd_unknown_user,
debian/patches-applied/054_pam_security_abstract_securetty_handling:
improve descriptions.
|