[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted pam 0.99.7.1-4 (source all amd64 i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 31 Aug 2007 17:11:05 -0700
Source: pam
Binary: libpam0g-dev libpam0g libpam-modules libpam-doc libpam-runtime libpam-cracklib
Architecture: source amd64 all i386
Version: 0.99.7.1-4
Distribution: unstable
Urgency: low
Maintainer: Steve Langasek <vorlon@debian.org>
Changed-By: Steve Langasek <vorlon@debian.org>
Description: 
 libpam-doc - Documentation of PAM
 libpam-runtime - Runtime support for the PAM library
 libpam-cracklib - PAM module to enable cracklib support
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 389197 439984 440019 440074 440355 440362 440368
Changes: 
 pam (0.99.7.1-4) unstable; urgency=low
 .
   * libpam0g.postinst, libpam0g.templates: gdm doesn't need to be restarted
     to fix the library skew, only reloaded; special-case this daemon in the
     postinst and remove the mention of it from the debconf template, also
     tightening the language of the debconf template in the process.
     Closes: #440074.
   * Add courier-authdaemon to the list of services that need to be
     restarted; thanks to Micah Anderson for reporting.
   * New patch pam_env_ignore_garbage.patch: fix pam_env to really skip over
     garbage lines in /etc/environment and log an error, instead of failing
     with an obscure error; and ignore any PAM_BAD_ITEM values returned
     by pam_putenv(), since this is the expected error return when trying
     to delete a non-existent var.  Closes: #439984.
   * Yet another thinko in hurd_no_setfsuid and in
     029_pam_limits_capabilities; this code should really be Hurd-safe at
     last...
   * getline() returns -1 on EOF, not 0; check this appropriately, to fix
     an infinite loop in pam_rhosts_auth.  Thanks to Stephan Springl
     <springl-rhosts@bfw-online.de> for the fix.  Closes: #440019.
   * Use ${misc:Depends} for libpam0g, so we get a proper dependency on
     debconf.
   * 019_pam_listfile_quiet: per discussion with upstream, don't suppress
     errors about missing files or files with wrong permissions; these are
     real errors that should not be buried.
   * Drop the remainder of 061_pam_issue_double_free, not required for the
     original bugfix.
   * Drop patch 064_pam_unix_cracklib_dictpath, which is not needed now that
     we define CRACKLIB_DICTS in debian/rules.
   * Drop patch 063_paswd_segv, superseded by a different upstream fix
   * Split 047_pam_limits_chroot_string_value up between
     008_modules_pam_limits_chroot and 029_pam_limits_capabilites
   * Updates to patch 007_modules_pam_unix: restore the same built-in min
     password len of 6 that upstream uses; fix a typo panlindrome ->
     palindrome.
   * The 'max=' option was never intended to be used to limit maximum password
     length for users, only to declare what the number of significant
     characters /is/ for a password.  But we don't need a config option to
     tell us that, we know the answer based on which crypt type we're using,
     so drop this as a config file option.  Closes: #389197.
   * Debconf translations:
     - Spanish, thanks to Javier Fernández-Sanguino Peña <jfs@debian.org>
     - Vietnamese, thanks to Clytie Siddall <clytie@riverland.net.au>
     - German, thanks to Sven Joachim <svenjoac@gmx.de> (closes: #440355)
     - Czech, thanks to Miroslav Kure <kurem@upcase.inf.upol.cz>
       (closes: #440362)
     - Portuguese, thanks to Américo Monteiro <a_monteiro@netcabo.pt>
       (closes: #440368)
Files: 
 cb4a600503b243b112ec18f630a5fb76 1160 libs optional pam_0.99.7.1-4.dsc
 b1de189bf361284f0f2f8d38a16300fe 113312 libs optional pam_0.99.7.1-4.diff.gz
 2e3b058f0ac92d72fa07939da9932290 97762 admin required libpam-runtime_0.99.7.1-4_all.deb
 6aa82d016aa8a28ece06cc7273a1239d 265992 doc optional libpam-doc_0.99.7.1-4_all.deb
 b33b386e594f347e232568513e0155a3 81968 libs required libpam0g_0.99.7.1-4_amd64.deb
 1f9fe17fbd79447a0d6c659230c1f766 264606 libs required libpam-modules_0.99.7.1-4_amd64.deb
 a060a2ddae3ae4b9c38a9279d1cabe3d 143794 libdevel optional libpam0g-dev_0.99.7.1-4_amd64.deb
 b15b34811d2d2e71b90773765f26e702 49176 libs optional libpam-cracklib_0.99.7.1-4_amd64.deb
 34a3a8266af72cf2fb31afa542480b3c 79088 libs required libpam0g_0.99.7.1-4_i386.deb
 33a816ef585667a473a3fd8cd2572e34 253190 libs required libpam-modules_0.99.7.1-4_i386.deb
 178c6163ea43924525a2316126468a84 141836 libdevel optional libpam0g-dev_0.99.7.1-4_i386.deb
 10386ea56a7b8e51c4f0e872bbe86358 49170 libs optional libpam-cracklib_0.99.7.1-4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG2MAVKN6ufymYLloRAhv3AJ9e1dh8G/qB4IV9UtIEoYcUfQiMhACghydF
LnoLJ9s7yN0B3ScYF+nYCWo=
=PkA/
-----END PGP SIGNATURE-----


Accepted:
libpam-cracklib_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam-cracklib_0.99.7.1-4_amd64.deb
libpam-cracklib_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam-cracklib_0.99.7.1-4_i386.deb
libpam-doc_0.99.7.1-4_all.deb
  to pool/main/p/pam/libpam-doc_0.99.7.1-4_all.deb
libpam-modules_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam-modules_0.99.7.1-4_amd64.deb
libpam-modules_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam-modules_0.99.7.1-4_i386.deb
libpam-runtime_0.99.7.1-4_all.deb
  to pool/main/p/pam/libpam-runtime_0.99.7.1-4_all.deb
libpam0g-dev_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam0g-dev_0.99.7.1-4_amd64.deb
libpam0g-dev_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam0g-dev_0.99.7.1-4_i386.deb
libpam0g_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam0g_0.99.7.1-4_amd64.deb
libpam0g_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam0g_0.99.7.1-4_i386.deb
pam_0.99.7.1-4.diff.gz
  to pool/main/p/pam/pam_0.99.7.1-4.diff.gz
pam_0.99.7.1-4.dsc
  to pool/main/p/pam/pam_0.99.7.1-4.dsc



Reply to: