Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: pam | Distribution: openSUSE Tumbleweed |
Version: 1.7.0 | Vendor: openSUSE |
Release: 2.4 | Build date: Thu Dec 5 13:44:33 2024 |
Group: System/Libraries | Build host: reproducible |
Size: 1756687 | Source RPM: pam-1.7.0-2.4.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://github.com/linux-pam/linux-pam | |
Summary: A Security Tool that Provides Authentication for Applications |
PAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policies without having to recompile programs that do authentication.
GPL-2.0-or-later OR BSD-3-Clause
* Thu Dec 05 2024 Valentin Lefebvre <valentin.lefebvre@suse.com> - pam_access: rework resolving of tokens as hostname - separate resolving of IP addresses from hostnames. Don't resolve TTYs or display variables as hostname. - Add "nodns" option to disallow resolving of tokens as hostname. - [pam_access-rework-resolving-of-tokens-as-hostname.patch, bsc#1233078, CVE-2024-10963] * Thu Oct 24 2024 Thorsten Kukuk <kukuk@suse.com> - Update to version 1.7.0 - build: changed build system from autotools to meson. - libpam_misc: use ECHOCTL in the terminal input - pam_access: support UID and GID in access.conf - pam_env: install environment file in vendordir if vendordir is enabled - pam_issue: only count class user if logind support is enabled - pam_limits: use systemd-logind instead of utmp if logind support is enabled - pam_unix: compare password hashes in constant time - Multiple minor bug fixes, build fixes, portability fixes, documentation improvements, and translation updates. - Drop upstream patches: - pam-bsc1194818-cursor-escape.patch - pam_limits-systemd.patch - pam_issue-systemd.patch * Thu Sep 12 2024 Thorsten Kukuk <kukuk@suse.com> - baselibs.conf: add pam-userdb * Tue Sep 10 2024 Thorsten Kukuk <kukuk@suse.com> - pam_limits-systemd.patch: update to final PR * Fri Sep 06 2024 Thorsten Kukuk <kukuk@suse.com> - Add systemd-logind support to pam_limits (pam_limits-systemd.patch) - Remove /usr/etc/pam.d, everything should be migrated - Remove pam_limits from default common-sessions* files. pam_limits is now part of pam-extra and not in our default generated config. - pam_issue-systemd.patch: only count class user sessions * Wed Aug 07 2024 Stanislav Brabec <sbrabec@suse.com> - Prevent cursor escape from the login prompt [bsc#1194818] * Added: pam-bsc1194818-cursor-escape.patch * Wed Apr 10 2024 Thorsten Kukuk <kukuk@suse.com> - Update to version 1.6.1 - pam_env: fixed --disable-econf --enable-vendordir support. - pam_unix: do not warn if password aging is disabled. - pam_unix: try to set uid to 0 before unix_chkpwd invocation. - pam_unix: allow empty passwords with non-empty hashes. - Multiple minor bug fixes, build fixes, portability fixes, documentation improvements, and translation updates. - Remove backports: - pam_env-fix_vendordir.patch - pam_env-fix-enable-vendordir-fallback.patch - pam_env-remove-escaped-newlines.patch - pam_unix-fix-password-aging-disabled.patch * Thu Feb 22 2024 Valentin Lefebvre <valentin.lefebvre@suse.com> - Use autosetup to prepare for RPM 4.20. * Wed Feb 07 2024 Thorsten Kukuk <kukuk@suse.com> - pam.tmpfiles: Make sure the content of the /run directories get removed in case of a soft-reboot * Tue Jan 30 2024 Thorsten Kukuk <kukuk@suse.com> - Enable pam_canonicalize_user.so * Fri Jan 19 2024 Thorsten Kukuk <kukuk@suse.com> - Add post 1.6.0 release fixes for pam_env and pam_unix: - pam_env-fix-enable-vendordir-fallback.patch - pam_env-fix_vendordir.patch - pam_env-remove-escaped-newlines.patch - pam_unix-fix-password-aging-disabled.patch - Update to version 1.6.0 - Added support of configuration files with arbitrarily long lines. - build: fixed build outside of the source tree. - libpam: added use of getrandom(2) as a source of randomness if available. - libpam: fixed calculation of fail delay with very long delays. - libpam: fixed potential infinite recursion with includes. - libpam: implemented string to number conversions validation when parsing controls in configuration. - pam_access: added quiet_log option. - pam_access: fixed truncation of very long group names. - pam_canonicalize_user: new module to canonicalize user name. - pam_echo: fixed file handling to prevent overflows and short reads. - pam_env: added support of '\' character in environment variable values. - pam_exec: allowed expose_authtok for password PAM_TYPE. - pam_exec: fixed stack overflow with binary output of programs. - pam_faildelay: implemented parameter ranges validation. - pam_listfile: changed to treat \r and \n exactly the same in configuration. - pam_mkhomedir: hardened directory creation against timing attacks. - Please note that using *at functions leads to more open file handles during creation. - pam_namespace: fixed potential local DoS (CVE-2024-22365). - pam_nologin: fixed file handling to prevent short reads. - pam_pwhistory: helper binary is now built only if SELinux support is enabled. - pam_pwhistory: implemented reliable usernames handling when remembering passwords. - pam_shells: changed to allow shell entries with absolute paths only. - pam_succeed_if: fixed treating empty strings as numerical value 0. - pam_unix: added support of disabled password aging. - pam_unix: synchronized password aging with shadow. - pam_unix: implemented string to number conversions validation. - pam_unix: fixed truncation of very long user names. - pam_unix: corrected rounds retrieval for configured encryption method. - pam_unix: implemented reliable usernames handling when remembering passwords. - pam_unix: changed to always run the helper to obtain shadow password entries. - pam_unix: unix_update helper binary is now built only if SELinux support is enabled. - pam_unix: added audit support to unix_update helper. - pam_userdb: added gdbm support. - Multiple minor bug fixes, portability fixes, documentation improvements, and translation updates. - The following patches are obsolete with the update: - pam_access-doc-IPv6-link-local.patch - pam_access-hostname-debug.patch - pam_shells-fix-econf-memory-leak.patch - pam_shells-fix-econf-memory-leak.patch - disable-examples.patch - pam-login_defs-check.sh: adjust checksum, SHA_CRYPT_MAX_ROUNDS is no longer used. * Wed Aug 23 2023 Thorsten Kukuk <kukuk@suse.com> - Fix building without SELinux * Mon Aug 07 2023 Thorsten Kukuk <kukuk@suse.com> - pam_access backports from upstream: - pam_access-doc-IPv6-link-local.patch: Document only partial supported IPv6 link local addresses - pam_access-hostname-debug.patch: Don't print error if we cannot resolve a hostname, does not need to be a hostname - pam_shells-fix-econf-memory-leak.patch: Free econf keys variable - disable-examples.patch: Don't build examples * Tue May 09 2023 Thorsten Kukuk <kukuk@suse.com> - Update to final 1.5.3 release: - configure: added --enable-logind option to use logind instead of utmp in pam_issue and pam_timestamp. - pam_modutil_getlogin: changed to use getlogin() from libc instead of parsing utmp. - Added libeconf support to pam_env and pam_shells. - Added vendor directory support to pam_access, pam_env, pam_group, pam_faillock, pam_limits, pam_namespace, pam_pwhistory, pam_sepermit, pam_shells, and pam_time. - pam_limits: changed to not fail on missing config files. - pam_pwhistory: added conf= option to specify config file location. - pam_pwhistory: added file= option to specify password history file location. - pam_shells: added shells.d support when libeconf and vendordir are enabled. - Deprecated pam_lastlog: this module is no longer built by default because it uses utmp, wtmp, btmp and lastlog, but none of them are Y2038 safe, even on 64bit architectures. pam_lastlog will be removed in one of the next releases, consider using pam_lastlog2 (from https://github.com/thkukuk/lastlog2) and/or pam_wtmpdb (from https://github.com/thkukuk/wtmpdb) instead. - Deprecated _pam_overwrite(), _pam_overwrite_n(), and _pam_drop_reply() macros provided by _pam_macros.h; the memory override performed by these macros can be optimized out by the compiler and therefore can no longer be relied upon. * Thu Apr 20 2023 Thorsten Kukuk <kukuk@suse.com> - pam-extra: add split provide * Wed Apr 12 2023 Thorsten Kukuk <kukuk@suse.com> - pam-userdb: add split provide * Tue Apr 11 2023 Thorsten Kukuk <kukuk@suse.com> - Drop pam-xauth_ownership.patch, got fixed in sudo itself - Drop pam-bsc1177858-dont-free-environment-string.patch, was a fix for above patch * Thu Apr 06 2023 Thorsten Kukuk <kukuk@suse.com> - Use bcond selinux to disable SELinux - Remove old pam_unix_* compat symlinks - Move pam_userdb to own pam-userdb sub-package - pam-extra contains now modules having extended dependencies like libsystemd - Update to 1.5.3.90 git snapshot - Drop merged patches: - pam-git.diff - docbook5.patch - pam_pwhistory-docu.patch - pam_xauth_data.3.xml.patch - Drop Linux-PAM-1.5.2.90.tar.xz as we have to rebuild all documentation anyways and don't use the prebuild versions - Move all devel manual pages to pam-manpages, too. Fixes the problem that adjusted defaults not shown correct. * Mon Mar 20 2023 Thorsten Kukuk <kukuk@suse.com> - Add common-session-nonlogin and postlogin-* pam.d config files for https://github.com/SUSE/pam-config/pull/16, pam_lastlog2 and upcoming pam_wtmpdb. * Fri Mar 10 2023 Giuliano Belinassi <giuliano.belinassi@suse.com> - Enable livepatching support on x86_64. * Tue Jan 24 2023 Valentin Lefebvre <valentin.lefebvre@suse.com> - Use rpm macros for pam dist conf dir (/usr/etc/security) * Wed Jan 18 2023 Stefan Schubert <schubi@suse.com> - Moved following files/dirs in /etc/security to vendor directory: access.conf, limits.d, sepermit.conf, time.conf, namespace.conf, namespace.d, namespace.init * Sat Dec 24 2022 Dominique Leuenberger <dleuenberger@suse.com> - Also obsolete pam_unix-32bit to have clean upgrade path. * Fri Dec 16 2022 Thorsten Kukuk <kukuk@suse.com> - Merge pam_unix back into pam, seperate package not needed anymore * Thu Dec 15 2022 Thorsten Kukuk <kukuk@suse.com> - Update pam-git.diff to current upstream - pam_env: Use vendor specific pam_env.conf and environment as fallback - pam_shells: Use the vendor directory obsoletes pam_env_econf.patch - Refresh docbook5.patch * Tue Dec 06 2022 Thorsten Kukuk <kukuk@suse.com> - pam_pwhistory-docu.patch, docbook5.patch: convert docu to docbook5 * Thu Dec 01 2022 Thorsten Kukuk <kukuk@suse.com> - pam-git.diff: update to current git - obsoletes pam-hostnames-in-access_conf.patch - obsoletes tst-pam_env-retval.c - pam_env_econf.patch refresh * Tue Nov 22 2022 Thorsten Kukuk <kukuk@suse.com> - Move pam_env config files below /usr/etc * Tue Oct 11 2022 Stefan Schubert <schubi@suse.com> - pam_env: Using libeconf for reading configuration and environment files. (Patch: pam_env_econf.patch; Testcase: tst-pam_env-retval.c) * Fri Jun 17 2022 Thorsten Kukuk <kukuk@suse.com> - Keep old directory in filelist for migration * Wed Jun 01 2022 Thorsten Kukuk <kukuk@suse.com> - Move PAM config files from /usr/etc/pam.d to /usr/lib/pam.d * Fri Mar 11 2022 Thorsten Kukuk <kukuk@suse.com> - pam-hostnames-in-access_conf.patch: update with upstream submission. Fixes several bugs including memory leaks. * Wed Feb 09 2022 Thorsten Kukuk <kukuk@suse.com> - Move group.conf and faillock.conf to /usr/etc/security * Mon Feb 07 2022 Thorsten Kukuk <kukuk@suse.com> - Update to current git for enhanced vendordir support (pam-git.diff) Obsoletes: - 0001-Include-pam_xauth_data.3.xml-in-source-archive-400.patch - 0002-Only-include-vendordir-in-manual-page-if-set-401.patch - 0003-Use-vendor-specific-limits.conf-as-fallback-402.patch
/etc/pam.d /etc/security /usr/etc/environment /usr/etc/security /usr/etc/security/access.conf /usr/etc/security/faillock.conf /usr/etc/security/group.conf /usr/etc/security/namespace.conf /usr/etc/security/namespace.d /usr/etc/security/namespace.init /usr/etc/security/pam_env.conf /usr/etc/security/pwhistory.conf /usr/etc/security/sepermit.conf /usr/etc/security/time.conf /usr/lib/pam.d /usr/lib/pam.d/common-account /usr/lib/pam.d/common-auth /usr/lib/pam.d/common-password /usr/lib/pam.d/common-session /usr/lib/pam.d/common-session-nonlogin /usr/lib/pam.d/other /usr/lib/pam.d/postlogin-account /usr/lib/pam.d/postlogin-auth /usr/lib/pam.d/postlogin-password /usr/lib/pam.d/postlogin-session /usr/lib/systemd/system/pam_namespace.service /usr/lib/tmpfiles.d/pam.conf /usr/lib64/libpam.so.0 /usr/lib64/libpam.so.0.85.1 /usr/lib64/libpam_misc.so.0 /usr/lib64/libpam_misc.so.0.82.1 /usr/lib64/libpamc.so.0 /usr/lib64/libpamc.so.0.82.1 /usr/lib64/security /usr/lib64/security/pam_access.so /usr/lib64/security/pam_canonicalize_user.so /usr/lib64/security/pam_debug.so /usr/lib64/security/pam_deny.so /usr/lib64/security/pam_echo.so /usr/lib64/security/pam_env.so /usr/lib64/security/pam_exec.so /usr/lib64/security/pam_faildelay.so /usr/lib64/security/pam_faillock.so /usr/lib64/security/pam_filter /usr/lib64/security/pam_filter.so /usr/lib64/security/pam_filter/upperLOWER /usr/lib64/security/pam_ftp.so /usr/lib64/security/pam_group.so /usr/lib64/security/pam_keyinit.so /usr/lib64/security/pam_listfile.so /usr/lib64/security/pam_localuser.so /usr/lib64/security/pam_loginuid.so /usr/lib64/security/pam_mail.so /usr/lib64/security/pam_mkhomedir.so /usr/lib64/security/pam_motd.so /usr/lib64/security/pam_namespace.so /usr/lib64/security/pam_nologin.so /usr/lib64/security/pam_permit.so /usr/lib64/security/pam_pwhistory.so /usr/lib64/security/pam_rhosts.so /usr/lib64/security/pam_rootok.so /usr/lib64/security/pam_securetty.so /usr/lib64/security/pam_selinux.so /usr/lib64/security/pam_sepermit.so /usr/lib64/security/pam_setquota.so /usr/lib64/security/pam_shells.so /usr/lib64/security/pam_stress.so /usr/lib64/security/pam_succeed_if.so /usr/lib64/security/pam_time.so /usr/lib64/security/pam_tty_audit.so /usr/lib64/security/pam_umask.so /usr/lib64/security/pam_unix.so /usr/lib64/security/pam_usertype.so /usr/lib64/security/pam_warn.so /usr/lib64/security/pam_wheel.so /usr/lib64/security/pam_xauth.so /usr/sbin/faillock /usr/sbin/mkhomedir_helper /usr/sbin/pam_namespace_helper /usr/sbin/pwhistory_helper /usr/sbin/unix2_chkpwd /usr/sbin/unix_chkpwd /usr/sbin/unix_update /usr/share/doc/packages/pam /usr/share/doc/packages/pam/NEWS /usr/share/licenses/pam /usr/share/licenses/pam/COPYING /usr/share/locale/af/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ar/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/as/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/az/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/be/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/bg/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/bn/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/bn_IN/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/bs/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ca/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/cs/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/cy/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/da/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/de/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/de_CH/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/el/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/eo/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/es/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/et/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/eu/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/fa/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/fi/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/fr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ga/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/gl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/gu/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/he/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/hi/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/hr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/hu/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ia/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/id/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/is/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/it/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ja/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ka/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/kk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/km/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/kn/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ko/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/lt/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/lv/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/mk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ml/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/mr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ms/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/nb/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ne/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/nl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/nn/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/or/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pa/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pt/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pt_BR/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ro/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ru/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/si/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sq/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sr@latin/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sv/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ta/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/te/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/th/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/tr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/uk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/vi/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/zh_CN/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/zh_HK/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/zh_TW/LC_MESSAGES/Linux-PAM.mo
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Mar 11 23:41:18 2025