| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: pam-manpages | Distribution: openSUSE Tumbleweed |
| Version: 1.7.1 | Vendor: openSUSE |
| Release: 5.1 | Build date: Mon Sep 15 09:53:29 2025 |
| Group: Documentation/HTML | Build host: reproducible |
| Size: 157403 | Source RPM: pam-full-src-1.7.1-5.1.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: https://github.com/linux-pam/linux-pam | |
| Summary: Manualpages for Pluggable Authentication Modules | |
PAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policies without having to recompile programs that do authentication. This package contains the manual pages.
GPL-2.0-or-later OR BSD-3-Clause
* Mon Sep 15 2025 Valentin Lefebvre <valentin.lefebvre@suse.com>
- pam_mkhomedir: building with vendordir option allows fetching skeleton
directory from the vendor directory when creating the user home directory.
[+ pam_mkhomedir-Use-vendordir-when-defined.patch, bsc#1245524]
* Wed Aug 27 2025 Thorsten Kukuk <kukuk@suse.com>
- Update to 1.7.1+git (post-v1.7.1.patch)
- disable unix_chkpwd by default, only used as fallback again
- pam_modutil_get-overwrite-password-at-free.patch is included
* Tue Aug 19 2025 Valentin Lefebvre <valentin.lefebvre@suse.com>
- Make sure that the buffer containing encrypted passwords get's erased,
before free.
[pam_modutil_get-overwrite-password-at-free.patch, bsc#1232234,
CVE-2024-10041]
* Wed Jun 18 2025 Thorsten Kukuk <kukuk@suse.com>
- hardcode disabling elogind, meson detection is unreliable in OBS
* Wed Jun 18 2025 Thorsten Kukuk <kukuk@suse.com>
- Update to version 1.7.1
- pam_access: do not resolve ttys or display variables as hostnames.
- pam_access: added "nodns" option to disallow resolving of tokens
as hostnames (CVE-2024-10963).
- pam_limits: added support for rttime (RLIMIT_RTTIME).
- pam_namespace: fixed potential privilege escalation (CVE-2025-6020).
- meson: added support of elogind as a logind provider.
- Multiple minor bug fixes, build fixes, portability fixes,
documentation improvements, and translation updates.
- pam_access-rework-resolving-of-tokens-as-hostname.patch got obsoleted
* Mon Mar 24 2025 Thorsten Kukuk <kukuk@suse.com>
- Remove unix2_chkpwd, no consumer left
* Thu Dec 05 2024 Valentin Lefebvre <valentin.lefebvre@suse.com>
- pam_access: rework resolving of tokens as hostname
- separate resolving of IP addresses from hostnames. Don't resolve TTYs or
display variables as hostname.
- Add "nodns" option to disallow resolving of tokens as hostname.
- [pam_access-rework-resolving-of-tokens-as-hostname.patch, bsc#1233078,
CVE-2024-10963]
* Thu Oct 24 2024 Thorsten Kukuk <kukuk@suse.com>
- Update to version 1.7.0
- build: changed build system from autotools to meson.
- libpam_misc: use ECHOCTL in the terminal input
- pam_access: support UID and GID in access.conf
- pam_env: install environment file in vendordir if vendordir is enabled
- pam_issue: only count class user if logind support is enabled
- pam_limits: use systemd-logind instead of utmp if logind support is enabled
- pam_unix: compare password hashes in constant time
- Multiple minor bug fixes, build fixes, portability fixes,
documentation improvements, and translation updates.
- Drop upstream patches:
- pam-bsc1194818-cursor-escape.patch
- pam_limits-systemd.patch
- pam_issue-systemd.patch
* Thu Sep 12 2024 Thorsten Kukuk <kukuk@suse.com>
- baselibs.conf: add pam-userdb
* Tue Sep 10 2024 Thorsten Kukuk <kukuk@suse.com>
- pam_limits-systemd.patch: update to final PR
* Fri Sep 06 2024 Thorsten Kukuk <kukuk@suse.com>
- Add systemd-logind support to pam_limits (pam_limits-systemd.patch)
- Remove /usr/etc/pam.d, everything should be migrated
- Remove pam_limits from default common-sessions* files. pam_limits
is now part of pam-extra and not in our default generated config.
- pam_issue-systemd.patch: only count class user sessions
* Wed Aug 07 2024 Stanislav Brabec <sbrabec@suse.com>
- Prevent cursor escape from the login prompt [bsc#1194818]
* Added: pam-bsc1194818-cursor-escape.patch
* Wed Apr 10 2024 Thorsten Kukuk <kukuk@suse.com>
- Update to version 1.6.1
- pam_env: fixed --disable-econf --enable-vendordir support.
- pam_unix: do not warn if password aging is disabled.
- pam_unix: try to set uid to 0 before unix_chkpwd invocation.
- pam_unix: allow empty passwords with non-empty hashes.
- Multiple minor bug fixes, build fixes, portability fixes,
documentation improvements, and translation updates.
- Remove backports:
- pam_env-fix_vendordir.patch
- pam_env-fix-enable-vendordir-fallback.patch
- pam_env-remove-escaped-newlines.patch
- pam_unix-fix-password-aging-disabled.patch
* Thu Feb 22 2024 Valentin Lefebvre <valentin.lefebvre@suse.com>
- Use autosetup to prepare for RPM 4.20.
* Wed Feb 07 2024 Thorsten Kukuk <kukuk@suse.com>
- pam.tmpfiles: Make sure the content of the /run directories get
removed in case of a soft-reboot
* Tue Jan 30 2024 Thorsten Kukuk <kukuk@suse.com>
- Enable pam_canonicalize_user.so
* Fri Jan 19 2024 Thorsten Kukuk <kukuk@suse.com>
- Add post 1.6.0 release fixes for pam_env and pam_unix:
- pam_env-fix-enable-vendordir-fallback.patch
- pam_env-fix_vendordir.patch
- pam_env-remove-escaped-newlines.patch
- pam_unix-fix-password-aging-disabled.patch
- Update to version 1.6.0
- Added support of configuration files with arbitrarily long lines.
- build: fixed build outside of the source tree.
- libpam: added use of getrandom(2) as a source of randomness if available.
- libpam: fixed calculation of fail delay with very long delays.
- libpam: fixed potential infinite recursion with includes.
- libpam: implemented string to number conversions validation when parsing
controls in configuration.
- pam_access: added quiet_log option.
- pam_access: fixed truncation of very long group names.
- pam_canonicalize_user: new module to canonicalize user name.
- pam_echo: fixed file handling to prevent overflows and short reads.
- pam_env: added support of '\' character in environment variable values.
- pam_exec: allowed expose_authtok for password PAM_TYPE.
- pam_exec: fixed stack overflow with binary output of programs.
- pam_faildelay: implemented parameter ranges validation.
- pam_listfile: changed to treat \r and \n exactly the same in configuration.
- pam_mkhomedir: hardened directory creation against timing attacks.
- Please note that using *at functions leads to more open file handles
during creation.
- pam_namespace: fixed potential local DoS (CVE-2024-22365).
- pam_nologin: fixed file handling to prevent short reads.
- pam_pwhistory: helper binary is now built only if SELinux support is
enabled.
- pam_pwhistory: implemented reliable usernames handling when remembering
passwords.
- pam_shells: changed to allow shell entries with absolute paths only.
- pam_succeed_if: fixed treating empty strings as numerical value 0.
- pam_unix: added support of disabled password aging.
- pam_unix: synchronized password aging with shadow.
- pam_unix: implemented string to number conversions validation.
- pam_unix: fixed truncation of very long user names.
- pam_unix: corrected rounds retrieval for configured encryption method.
- pam_unix: implemented reliable usernames handling when remembering
passwords.
- pam_unix: changed to always run the helper to obtain shadow password
entries.
- pam_unix: unix_update helper binary is now built only if SELinux support
is enabled.
- pam_unix: added audit support to unix_update helper.
- pam_userdb: added gdbm support.
- Multiple minor bug fixes, portability fixes, documentation improvements,
and translation updates.
- The following patches are obsolete with the update:
- pam_access-doc-IPv6-link-local.patch
- pam_access-hostname-debug.patch
- pam_shells-fix-econf-memory-leak.patch
- pam_shells-fix-econf-memory-leak.patch
- disable-examples.patch
- pam-login_defs-check.sh: adjust checksum, SHA_CRYPT_MAX_ROUNDS
is no longer used.
* Wed Aug 23 2023 Thorsten Kukuk <kukuk@suse.com>
- Fix building without SELinux
* Mon Aug 07 2023 Thorsten Kukuk <kukuk@suse.com>
- pam_access backports from upstream:
- pam_access-doc-IPv6-link-local.patch:
Document only partial supported IPv6 link local addresses
- pam_access-hostname-debug.patch:
Don't print error if we cannot resolve a hostname, does not
need to be a hostname
- pam_shells-fix-econf-memory-leak.patch:
Free econf keys variable
- disable-examples.patch:
Don't build examples
* Tue May 09 2023 Thorsten Kukuk <kukuk@suse.com>
- Update to final 1.5.3 release:
- configure: added --enable-logind option to use logind instead of utmp
in pam_issue and pam_timestamp.
- pam_modutil_getlogin: changed to use getlogin() from libc instead of
parsing utmp.
- Added libeconf support to pam_env and pam_shells.
- Added vendor directory support to pam_access, pam_env, pam_group,
pam_faillock, pam_limits, pam_namespace, pam_pwhistory, pam_sepermit,
pam_shells, and pam_time.
- pam_limits: changed to not fail on missing config files.
- pam_pwhistory: added conf= option to specify config file location.
- pam_pwhistory: added file= option to specify password history file
location.
- pam_shells: added shells.d support when libeconf and vendordir are enabled.
- Deprecated pam_lastlog: this module is no longer built by default because
it uses utmp, wtmp, btmp and lastlog, but none of them are Y2038 safe,
even on 64bit architectures.
pam_lastlog will be removed in one of the next releases, consider using
pam_lastlog2 (from https://github.com/thkukuk/lastlog2) and/or
pam_wtmpdb (from https://github.com/thkukuk/wtmpdb) instead.
- Deprecated _pam_overwrite(), _pam_overwrite_n(), and _pam_drop_reply()
macros provided by _pam_macros.h; the memory override performed by these
macros can be optimized out by the compiler and therefore can no longer
be relied upon.
* Thu Apr 20 2023 Thorsten Kukuk <kukuk@suse.com>
- pam-extra: add split provide
* Wed Apr 12 2023 Thorsten Kukuk <kukuk@suse.com>
- pam-userdb: add split provide
* Tue Apr 11 2023 Thorsten Kukuk <kukuk@suse.com>
- Drop pam-xauth_ownership.patch, got fixed in sudo itself
- Drop pam-bsc1177858-dont-free-environment-string.patch, was a
fix for above patch
* Thu Apr 06 2023 Thorsten Kukuk <kukuk@suse.com>
- Use bcond selinux to disable SELinux
- Remove old pam_unix_* compat symlinks
- Move pam_userdb to own pam-userdb sub-package
- pam-extra contains now modules having extended dependencies like
libsystemd
- Update to 1.5.3.90 git snapshot
- Drop merged patches:
- pam-git.diff
- docbook5.patch
- pam_pwhistory-docu.patch
- pam_xauth_data.3.xml.patch
- Drop Linux-PAM-1.5.2.90.tar.xz as we have to rebuild all
documentation anyways and don't use the prebuild versions
- Move all devel manual pages to pam-manpages, too. Fixes the
problem that adjusted defaults not shown correct.
* Mon Mar 20 2023 Thorsten Kukuk <kukuk@suse.com>
- Add common-session-nonlogin and postlogin-* pam.d config files
for https://github.com/SUSE/pam-config/pull/16, pam_lastlog2
and upcoming pam_wtmpdb.
* Fri Mar 10 2023 Giuliano Belinassi <giuliano.belinassi@suse.com>
- Enable livepatching support on x86_64.
* Tue Jan 24 2023 Valentin Lefebvre <valentin.lefebvre@suse.com>
- Use rpm macros for pam dist conf dir (/usr/etc/security)
* Wed Jan 18 2023 Stefan Schubert <schubi@suse.com>
- Moved following files/dirs in /etc/security to vendor directory:
access.conf, limits.d, sepermit.conf, time.conf, namespace.conf,
namespace.d, namespace.init
* Sat Dec 24 2022 Dominique Leuenberger <dleuenberger@suse.com>
- Also obsolete pam_unix-32bit to have clean upgrade path.
* Fri Dec 16 2022 Thorsten Kukuk <kukuk@suse.com>
- Merge pam_unix back into pam, seperate package not needed anymore
* Thu Dec 15 2022 Thorsten Kukuk <kukuk@suse.com>
- Update pam-git.diff to current upstream
- pam_env: Use vendor specific pam_env.conf and environment as fallback
- pam_shells: Use the vendor directory
obsoletes pam_env_econf.patch
- Refresh docbook5.patch
* Tue Dec 06 2022 Thorsten Kukuk <kukuk@suse.com>
- pam_pwhistory-docu.patch, docbook5.patch: convert docu to
docbook5
* Thu Dec 01 2022 Thorsten Kukuk <kukuk@suse.com>
- pam-git.diff: update to current git
- obsoletes pam-hostnames-in-access_conf.patch
- obsoletes tst-pam_env-retval.c
- pam_env_econf.patch refresh
* Tue Nov 22 2022 Thorsten Kukuk <kukuk@suse.com>
- Move pam_env config files below /usr/etc
* Tue Oct 11 2022 Stefan Schubert <schubi@suse.com>
- pam_env: Using libeconf for reading configuration and environment
files. (Patch: pam_env_econf.patch; Testcase: tst-pam_env-retval.c)
* Fri Jun 17 2022 Thorsten Kukuk <kukuk@suse.com>
- Keep old directory in filelist for migration
* Wed Jun 01 2022 Thorsten Kukuk <kukuk@suse.com>
- Move PAM config files from /usr/etc/pam.d to /usr/lib/pam.d
* Fri Mar 11 2022 Thorsten Kukuk <kukuk@suse.com>
- pam-hostnames-in-access_conf.patch: update with upstream
submission. Fixes several bugs including memory leaks.
* Wed Feb 09 2022 Thorsten Kukuk <kukuk@suse.com>
- Move group.conf and faillock.conf to /usr/etc/security
* Mon Feb 07 2022 Thorsten Kukuk <kukuk@suse.com>
- Update to current git for enhanced vendordir support (pam-git.diff)
Obsoletes:
- 0001-Include-pam_xauth_data.3.xml-in-source-archive-400.patch
- 0002-Only-include-vendordir-in-manual-page-if-set-401.patch
- 0003-Use-vendor-specific-limits.conf-as-fallback-402.patch
/usr/share/man/man3/misc_conv.3.gz /usr/share/man/man3/pam.3.gz /usr/share/man/man3/pam_acct_mgmt.3.gz /usr/share/man/man3/pam_authenticate.3.gz /usr/share/man/man3/pam_chauthtok.3.gz /usr/share/man/man3/pam_close_session.3.gz /usr/share/man/man3/pam_conv.3.gz /usr/share/man/man3/pam_end.3.gz /usr/share/man/man3/pam_error.3.gz /usr/share/man/man3/pam_fail_delay.3.gz /usr/share/man/man3/pam_get_authtok.3.gz /usr/share/man/man3/pam_get_authtok_noverify.3.gz /usr/share/man/man3/pam_get_authtok_verify.3.gz /usr/share/man/man3/pam_get_data.3.gz /usr/share/man/man3/pam_get_item.3.gz /usr/share/man/man3/pam_get_user.3.gz /usr/share/man/man3/pam_getenv.3.gz /usr/share/man/man3/pam_getenvlist.3.gz /usr/share/man/man3/pam_info.3.gz /usr/share/man/man3/pam_misc_drop_env.3.gz /usr/share/man/man3/pam_misc_paste_env.3.gz /usr/share/man/man3/pam_misc_setenv.3.gz /usr/share/man/man3/pam_open_session.3.gz /usr/share/man/man3/pam_prompt.3.gz /usr/share/man/man3/pam_putenv.3.gz /usr/share/man/man3/pam_set_data.3.gz /usr/share/man/man3/pam_set_item.3.gz /usr/share/man/man3/pam_setcred.3.gz /usr/share/man/man3/pam_sm_acct_mgmt.3.gz /usr/share/man/man3/pam_sm_authenticate.3.gz /usr/share/man/man3/pam_sm_chauthtok.3.gz /usr/share/man/man3/pam_sm_close_session.3.gz /usr/share/man/man3/pam_sm_open_session.3.gz /usr/share/man/man3/pam_sm_setcred.3.gz /usr/share/man/man3/pam_start.3.gz /usr/share/man/man3/pam_strerror.3.gz /usr/share/man/man3/pam_syslog.3.gz /usr/share/man/man3/pam_verror.3.gz /usr/share/man/man3/pam_vinfo.3.gz /usr/share/man/man3/pam_vprompt.3.gz /usr/share/man/man3/pam_vsyslog.3.gz /usr/share/man/man3/pam_xauth_data.3.gz /usr/share/man/man5/access.conf.5.gz /usr/share/man/man5/environment.5.gz /usr/share/man/man5/faillock.conf.5.gz /usr/share/man/man5/group.conf.5.gz /usr/share/man/man5/limits.conf.5.gz /usr/share/man/man5/motd.5.gz /usr/share/man/man5/namespace.conf.5.gz /usr/share/man/man5/pam.conf.5.gz /usr/share/man/man5/pam.d.5.gz /usr/share/man/man5/pam_env.conf.5.gz /usr/share/man/man5/pwhistory.conf.5.gz /usr/share/man/man5/sepermit.conf.5.gz /usr/share/man/man5/time.conf.5.gz /usr/share/man/man8/PAM.8.gz /usr/share/man/man8/faillock.8.gz /usr/share/man/man8/mkhomedir_helper.8.gz /usr/share/man/man8/pam.8.gz /usr/share/man/man8/pam_access.8.gz /usr/share/man/man8/pam_canonicalize_user.8.gz /usr/share/man/man8/pam_debug.8.gz /usr/share/man/man8/pam_deny.8.gz /usr/share/man/man8/pam_echo.8.gz /usr/share/man/man8/pam_env.8.gz /usr/share/man/man8/pam_exec.8.gz /usr/share/man/man8/pam_faildelay.8.gz /usr/share/man/man8/pam_faillock.8.gz /usr/share/man/man8/pam_filter.8.gz /usr/share/man/man8/pam_ftp.8.gz /usr/share/man/man8/pam_group.8.gz /usr/share/man/man8/pam_issue.8.gz /usr/share/man/man8/pam_keyinit.8.gz /usr/share/man/man8/pam_limits.8.gz /usr/share/man/man8/pam_listfile.8.gz /usr/share/man/man8/pam_localuser.8.gz /usr/share/man/man8/pam_loginuid.8.gz /usr/share/man/man8/pam_mail.8.gz /usr/share/man/man8/pam_mkhomedir.8.gz /usr/share/man/man8/pam_motd.8.gz /usr/share/man/man8/pam_namespace.8.gz /usr/share/man/man8/pam_namespace_helper.8.gz /usr/share/man/man8/pam_nologin.8.gz /usr/share/man/man8/pam_permit.8.gz /usr/share/man/man8/pam_pwhistory.8.gz /usr/share/man/man8/pam_rhosts.8.gz /usr/share/man/man8/pam_rootok.8.gz /usr/share/man/man8/pam_securetty.8.gz /usr/share/man/man8/pam_selinux.8.gz /usr/share/man/man8/pam_sepermit.8.gz /usr/share/man/man8/pam_setquota.8.gz /usr/share/man/man8/pam_shells.8.gz /usr/share/man/man8/pam_stress.8.gz /usr/share/man/man8/pam_succeed_if.8.gz /usr/share/man/man8/pam_time.8.gz /usr/share/man/man8/pam_timestamp.8.gz /usr/share/man/man8/pam_timestamp_check.8.gz /usr/share/man/man8/pam_tty_audit.8.gz /usr/share/man/man8/pam_umask.8.gz /usr/share/man/man8/pam_unix.8.gz /usr/share/man/man8/pam_usertype.8.gz /usr/share/man/man8/pam_warn.8.gz /usr/share/man/man8/pam_wheel.8.gz /usr/share/man/man8/pam_xauth.8.gz /usr/share/man/man8/pwhistory_helper.8.gz /usr/share/man/man8/unix_chkpwd.8.gz /usr/share/man/man8/unix_update.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Oct 23 22:37:43 2025