[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted pam 1.0.1-1 (source all amd64)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 28 Jul 2008 13:56:26 -0700
Source: pam
Binary: libpam0g libpam-modules libpam-runtime libpam0g-dev libpam-cracklib libpam-doc
Architecture: source all amd64
Version: 1.0.1-1
Distribution: unstable
Urgency: low
Maintainer: Steve Langasek <vorlon@debian.org>
Changed-By: Steve Langasek <vorlon@debian.org>
Description: 
 libpam-cracklib - PAM module to enable cracklib support
 libpam-doc - Documentation of PAM
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam-runtime - Runtime support for the PAM library
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 155583 203222 367834 382987 403718 404836 421010 442049 444427 451722 454237 469635 470137 484249 491821
Changes: 
 pam (1.0.1-1) unstable; urgency=low
 .
   * New upstream version.
     - pam_limits: bound RLIMIT_NICE from below. Closes: #403718.
     - pam_mail: set the MAIL variable even when .hushlogin is set.
       Closes: #421010.
     - new minclass option introduced for pam_cracklib.  Closes: #454237.
     - fix a failure to check the string length when matching usernames in
       pam_group.  Closes: #444427.
     - fix setting shell security context in pam_selinux.  Closes: #451722.
     - use --disable-audit, to avoid libaudit being linked in
       accidentally
     - pam_unix now supports SHA-256 and SHA-512 password hashes.
       Closes: #484249, LP: #245786.
     - pam_rhosts_auth is dropped upstream (closes: #382987); add a compat
       symlink to pam_rhosts to support upgrades for a release, and give a
       warning in NEWS.Debian.
     - new symbol in libpam.so.0, pam_modutil_audit_write; shlibs bump, and
       do another round of service restarts on upgrade.
     - pam_unix helper is now called whenever an unprivileged process
       tries and fails to query a user's account status.  Closes: #367834.
   * Drop patches 006_docs_cleanup, 015_hurd_portability,
     019_pam_listfile_quiet, 024_debian_cracklib_dict_path, 038_support_hurd,
     043_pam_unix_unknown_user_not_alert, 046_pam_group_example,
     no_pthread_mutexes, limits_wrong_strncpy, misc_conv_allow_sigint.patch,
     pam_tally_audit.patch, 057_pam_unix_passwd_OOM_check, and
     065_pam_unix_cracklib_disable which have been merged upstream.
   * Patch 022_pam_unix_group_time_miscfixes: partially merged upstream;
     now is really just "pam_group_miscfixes".
   * Patch 007_modules_pam_unix partially superseded upstream; stripping
     hpux-style expiry information off of password fields is now supported.
   * New patch pam_unix_thread-safe_save_old_password.patch, to make sure all
     our getpwnam() use in pam_unix is thread-safe (fixes an upstream
     regression)
   * New patch pam_unix_fix_sgid_shadow_auth.patch, fixing an upstream
     regression which prevents sgid shadow apps from being able to authenticate
     any more because the module forces use of the helper and the helper won't
     allow authentication of arbitrary users.  This change does mean we're
     going to be noisier for the time being in an SELinux environment, which
     should be addressed but is not a regression on Debian.
   * New patch pam_unix_dont_trust_chkpwd_caller.patch, rolling back an
     upstream change that causes unix_chkpwd to assume that setuid(getuid())
     is sufficient to drop permissions and attempt any authentication on
     behalf of the user.
   * The password-changing helper functionality for SELinux systems has been
     split out into a separate unix_update binary, so at long last we can
     change unix_chkpwd to be sgid shadow instead of suid root.
     Closes: #155583.
     - Update the lintian override to match.
   * Install the new unix_update helper into libpam-modules.
   * Use a pristine upstream tarball instead of repacking; requires various
     changes to debian/rules and debhelper files.
   * Replace the Vcs-Svn field with a Vcs-Bzr field; jumping ship from svn,
     and how!
   * Debconf translations:
     - Romanian, thanks to Igor Stirbu <igor.stirbu@gmail.com>
       (closes: #491821)
   * Add libpam0g.symbols, for finer-grained package dependencies with
     dpkg-gensymbols.
   * Fix debian/copyright to list the known copyright holders
   * Fix up the doc-base sections for the libpam-doc documentation, "Apps"
     should not be part of the section name
   * Also fix up whitespace issues in the doc-base abstracts
   * Fix a typo in the libpam0g-dev description.
   * 027_pam_limits_better_init_allow_explicit_root: RLIM_INFINITY is also
     invalid for RLIMIT_NOFILE, so when resetting the limits for a new session,
     use the kernel default of 1024 instead.  Closes: #404836.
   * Create /etc/environment on initial install of libpam-modules (or on
     upgrade from an old version), to quell warnings in the logs about it
     being missing.  Closes: #442049.
   * 026_pam_unix_passwd_unknown_user: drop a redundant, and broken, check for
     the NSS source of our user; this was preventing password changes for NIS
     users, which otherwise should have worked.  Closes: #203222, LP: #9224.
   * New patch do_not_check_nis_accidentally: respect the 'nis' option
     (set or unset) when looking up the user's password entry for password
     changes.  Thanks to Quentin Godfroy <godfroy@clipper.ens.fr> for the
     patch.  Closes: #469635.
   * Drop patch 049_pam_unix_sane_locking, which upon review is not needed;
     it reduces the length of time we hold the lock, but at the expense of
     being able to enforce minimum times between password changes.
   * debian/watch: upstream has hit 1.0, so we're no longer in a "pre"
     directory.  Fix up the regex for uscan.
   * Fix the libpam0g-dev examples directory to not include a gratuitous
     .cvsignore file.
   * New patch, pam.d-manpage-section, to fix the manpage references to
     point to section 5 instead of section 8.
   * Update patch PAM-manpage-section to fix the references to pam(7) from
     other manpages.  Closes: #470137.
   * Add debian/README.source documenting that this package uses quilt.
   * Bump Standards-Version to 3.8.0.
   * Fix a bug in the uid-restoring code in the hurd_no_setfsuid patch; thanks
     to Tomas Mraz <tmraz@redhat.com> for indirectly bringing this to my
     attention
Checksums-Sha1: 
 b00c2cba90e31d76ea37816cf35561b3ccadca38 1427 pam_1.0.1-1.dsc
 28e0a4646c5ccb76adfc266f37f3ba3a2618d121 1597124 pam_1.0.1.orig.tar.gz
 c6d17f8e72b36a5beaee4a3feacf881515030394 144019 pam_1.0.1-1.diff.gz
 39ad2943dd7427875c31b04382b5ac025008519b 164914 libpam-runtime_1.0.1-1_all.deb
 65713c47db324137128367a3d5dc8d1b733d6025 285868 libpam-doc_1.0.1-1_all.deb
 6f61782d85044bd47485c6a2d9ea4dd2ca7adb24 107508 libpam0g_1.0.1-1_amd64.deb
 79238ba15156c08c9accc7bf363c5ad5058f5d44 298568 libpam-modules_1.0.1-1_amd64.deb
 180c22c005e91bb5e84b9ee0558e7e770aeaac82 162128 libpam0g-dev_1.0.1-1_amd64.deb
 a2f3b53c07c36402cfb6992f01982483db211f3b 64318 libpam-cracklib_1.0.1-1_amd64.deb
Checksums-Sha256: 
 1a21fda99ed677bbc1a96cc8d723b2f3e6c396b64bdcbfba90c133bcaf71d430 1427 pam_1.0.1-1.dsc
 10c503a5c42c5a570f5d2734c5f2996ca7559602701d5fe7fc44aef549c183af 1597124 pam_1.0.1.orig.tar.gz
 05fc2d49f1cf7832d764c7fcb4ab18a57893f26b35f55f772be9408af5e368ce 144019 pam_1.0.1-1.diff.gz
 b50601ac08f4081f319fdebe613003e3105087431034db73d9502d7e5dc1cf1d 164914 libpam-runtime_1.0.1-1_all.deb
 cda345cf4beb9e16d993cb7015aa578aae4653b0b97cef873f62a618f9a60564 285868 libpam-doc_1.0.1-1_all.deb
 5c0b68c19781604b06948edd0991d1b69632a481637bc73f97e4e39d1afb80f7 107508 libpam0g_1.0.1-1_amd64.deb
 9aab2558c85cd6c36f63f37d5b10f4302702f3d6c6ff04a91e01e133a54abf32 298568 libpam-modules_1.0.1-1_amd64.deb
 570afa8221de9ac65262f04e89888961325de30730907ed4b1861e9be77283f8 162128 libpam0g-dev_1.0.1-1_amd64.deb
 6e134cd3ff4fba651602cebca1d536c6193c521605360b4509670e95edceace7 64318 libpam-cracklib_1.0.1-1_amd64.deb
Files: 
 04ad642d85d596162521a4ffd09056e3 1427 libs optional pam_1.0.1-1.dsc
 bcaa5d9bf84137e0d128b2ff9b63b1d7 1597124 libs optional pam_1.0.1.orig.tar.gz
 76f3db9dcffbb8035a5730d176156674 144019 libs optional pam_1.0.1-1.diff.gz
 1cef1607354f804dc1fab832f90009b2 164914 admin required libpam-runtime_1.0.1-1_all.deb
 f56b374c6f5ce979eac4d29cf027be3e 285868 doc optional libpam-doc_1.0.1-1_all.deb
 fa233f51a67969fe14f884abbe1f8520 107508 libs required libpam0g_1.0.1-1_amd64.deb
 644b1b261e3c3ba2508af3b80afc226c 298568 libs required libpam-modules_1.0.1-1_amd64.deb
 a144ddb475ffa7b1ea589003e8ee885b 162128 libdevel optional libpam0g-dev_1.0.1-1_amd64.deb
 dbc7406a794e940c21423c5561efbcaa 64318 libs optional libpam-cracklib_1.0.1-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIj+kDKN6ufymYLloRAkTcAJ439wbpuxSC4MJ6bxArhGfK2k5qngCggWc3
lcN/vP31rMFDyra/1e11e10=
=yd9G
-----END PGP SIGNATURE-----


Accepted:
libpam-cracklib_1.0.1-1_amd64.deb
  to pool/main/p/pam/libpam-cracklib_1.0.1-1_amd64.deb
libpam-doc_1.0.1-1_all.deb
  to pool/main/p/pam/libpam-doc_1.0.1-1_all.deb
libpam-modules_1.0.1-1_amd64.deb
  to pool/main/p/pam/libpam-modules_1.0.1-1_amd64.deb
libpam-runtime_1.0.1-1_all.deb
  to pool/main/p/pam/libpam-runtime_1.0.1-1_all.deb
libpam0g-dev_1.0.1-1_amd64.deb
  to pool/main/p/pam/libpam0g-dev_1.0.1-1_amd64.deb
libpam0g_1.0.1-1_amd64.deb
  to pool/main/p/pam/libpam0g_1.0.1-1_amd64.deb
pam_1.0.1-1.diff.gz
  to pool/main/p/pam/pam_1.0.1-1.diff.gz
pam_1.0.1-1.dsc
  to pool/main/p/pam/pam_1.0.1-1.dsc
pam_1.0.1.orig.tar.gz
  to pool/main/p/pam/pam_1.0.1.orig.tar.gz


Reply to: