Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: pam | Distribution: openSUSE Leap 15.2 |
Version: 1.3.0 | Vendor: openSUSE |
Release: lp152.11.16.1 | Build date: Tue Oct 26 12:17:08 2021 |
Group: System/Libraries | Build host: obs-power9-06 |
Size: 4550782 | Source RPM: pam-1.3.0-lp152.11.16.1.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: http://www.linux-pam.org/ | |
Summary: A Security Tool that Provides Authentication for Applications |
PAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policies without having to recompile programs that do authentication.
GPL-2.0+ or BSD-3-Clause
* Thu Oct 21 2021 Josef Möllers <josef.moellers@suse.com> - Corrected a bad directive file which resulted in the "securetty" file to be installed as "macros.pam". [pam.spec] * Thu Oct 14 2021 Josef Möllers <josef.moellers@suse.com> - Added tmpfiles for pam to set up directory for pam_faillock. [pam.conf] * Wed Oct 06 2021 Josef Möllers <josef.moellers@suse.com> - Corrected macros.pam entry for %_pam_moduledir Cleanup in pam.spec: * Replaced all references to ${_lib}/security in pam.spec by %{_pam_moduledir} * Removed definition of (unused) "amdir". * Wed Sep 01 2021 Josef Möllers <josef.moellers@suse.com> - Added new file macros.pam on request of systemd. [bsc#1190052, macros.pam] * Wed Aug 25 2021 Josef Möllers <josef.moellers@suse.com> - Added pam_faillock to the set of modules. [jsc#sle-20638, pam-sle20638-add-pam_faillock.patch] * Tue May 11 2021 Josef Möllers <josef.moellers@suse.com> - In the 32-bit compatibility package for 64-bit architectures, require "systemd-32bit" to be also installed as it contains pam_systemd.so for 32 bit applications. [bsc#1185562, baselibs.conf] * Tue Apr 06 2021 Josef Möllers <josef.moellers@suse.com> - If "LOCAL" is configured in access.conf, and a login attempt from a remote host is made, pam_access tries to resolve "LOCAL" as a hostname and logs a failure. Checking explicitly for "LOCAL" and rejecting access in this case resolves this issue. [bsc#1184358, bsc1184358-prevent-LOCAL-from-being-resolved.patch] * Wed Mar 10 2021 Josef Möllers <josef.moellers@suse.com> - pam_limits: "unlimited" is not a legitimate value for "nofile" (see setrlimit(2)). So, when "nofile" is set to one of the "unlimited" values, it is set to the contents of "/proc/sys/fs/nr_open" instead. Also changed the manpage of pam_limits to express this. [bsc#1181443, pam-bsc1181443-make-nofile-unlimited-mean-nr_open.patch] * Mon Feb 08 2021 Josef Möllers <josef.moellers@suse.com> - Add a definition for pamdir to pam.spec So that a proper contents of macros.pam can be constructed. [pam.spec] * Fri Jan 15 2021 Josef Möllers <josef.moellers@suse.com> - Create macros.pam with definition of %_pamdir so packages which are commonly shared between Factory and SLE can use this macro [pam.spec] * Thu Nov 19 2020 Josef Möllers <josef.moellers@suse.com> - pam_cracklib: added code to check whether the password contains a substring of of the user's name of at least <N> characters length in some form. This is enabled by the new parameter "usersubstr=<N>" See https://github.com/libpwquality/libpwquality/commit/bfef79dbe6aa525e9557bf4b0a61e6dde12749c4 [jsc#SLE-16719, jsc#SLE-16720, pam-pam_cracklib-add-usersubstr.patch] * Wed Nov 18 2020 Josef Möllers <josef.moellers@suse.com> - pam_xauth.c: do not free() a string which has been (successfully) passed to putenv(). [bsc#1177858, pam-bsc1177858-dont-free-environment-string.patch] * Fri Nov 13 2020 Josef Möllers <josef.moellers@suse.com> - Initialize pam_unix pam_sm_acct_mgmt() local variable "daysleft" to avoid spurious (and misleading) Warning: your password will expire in ... days. fixed upstream with commit db6b293046a [bsc#1178727, pam-bsc1178727-initialize-daysleft.patch] * Thu Oct 15 2020 Josef Möllers <josef.moellers@suse.com> - /usr/bin/xauth chokes on the old user's $HOME being on an NFS file system. Run /usr/bin/xauth using the old user's uid/gid Patch courtesy of Dr. Werner Fink. [bsc#1174593, pam-xauth_ownership.patch] * Fri Mar 20 2020 Josef Möllers <josef.moellers@suse.com> - Moved pam_userdb to a separate package pam-extra. [bsc#1166510, pam.spec] * Fri Mar 13 2020 Marcus Meissner <meissner@suse.com> - disable libdb usage and pam_userdb again, as this causes some license conflicts. (bsc#1166510) * Fri Feb 21 2020 Josef Möllers <josef.moellers@suse.com> - Add libdb as build-time dependency to enable pam_userdb module. Enable pam_userdb.so [jsc#sle-7258, bsc#1164562, pam.spec] * Mon Nov 19 2018 josef.moellers@suse.com - When comparing an incoming IP address with an entry in access.conf that only specified a single host (ie no netmask), the incoming IP address was used rather than the IP address from access.conf, effectively comparing the incoming address with itself. (Also fixed a small typo while I was at it) [bsc#1115640, use-correct-IP-address.patch, CVE-2018-17953] * Thu Oct 11 2018 josef.moellers@suse.com - Remove limits for nproc from /etc/security/limits.conf ie remove pam-limit-nproc.patch [bsc#1110700, pam-limit-nproc.patch] * Thu May 03 2018 josef.moellers@suse.com - pam_umask.8 needed to be patched as well. [bsc#1089884, pam-fix-config-order-in-manpage.patch] * Wed May 02 2018 josef.moellers@suse.com - Changed order of configuration files to reflect actual code. [bsc#1089884, pam-fix-config-order-in-manpage.patch] * Thu Feb 22 2018 fvogt@suse.com - Use %license (boo#1082318) * Thu Oct 12 2017 schwab@suse.de - Prerequire group(shadow), user(root) * Fri Jan 27 2017 josef.moellers@suse.com - Allow symbolic hostnames in access.conf file. [pam-hostnames-in-access_conf.patch, boo#1019866] * Thu Dec 08 2016 josef.moellers@suse.com - Increased nproc limits for non-privileged users to 4069/16384. Removed limits for "root". [pam-limit-nproc.patch, bsc#1012494, bsc#1013706] * Sun Jul 31 2016 develop7@develop7.info - pam-limit-nproc.patch: increased process limit to help Chrome/Chromuim users with really lots of tabs. New limit gets closer to UserTasksMax parameter in logind.conf * Thu Jul 28 2016 kukuk@suse.de - Add doc directory to filelist. * Mon May 02 2016 kukuk@suse.de - Remove obsolete README.pam_tally [bsc#977973] * Thu Apr 28 2016 kukuk@suse.de - Update Linux-PAM to version 1.3.0 - Rediff encryption_method_nis.diff - Link pam_unix against libtirpc and external libnsl to enable IPv6 support. * Thu Apr 14 2016 kukuk@suse.de - Add /sbin/unix2_chkpwd (moved from pam-modules) * Mon Apr 11 2016 kukuk@suse.de - Remove (since accepted upstream): - 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - 0002-Remove-enable-static-modules-option-and-support-from.patch - 0003-fix-nis-checks.patch - 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch * Fri Apr 01 2016 kukuk@suse.de - Add 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch - Replace IPv4 only functions * Fri Apr 01 2016 kukuk@suse.de - Fix typo in common-account.pamd [bnc#959439] * Tue Mar 29 2016 kukuk@suse.de - Add 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - readd PAM_EXTERN for external PAM modules * Wed Mar 23 2016 kukuk@suse.de - Add 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - Add 0002-Remove-enable-static-modules-option-and-support-from.patch - Add 0003-fix-nis-checks.patch * Sat Jul 25 2015 joschibrauchle@gmx.de - Add folder /etc/security/limits.d as mentioned in 'man pam_limits' * Fri Jun 26 2015 kukuk@suse.de - Update to version 1.2.1 - security update for CVE-2015-3238 * Mon Apr 27 2015 kukuk@suse.de - Update to version 1.2.0 - obsoletes Linux-PAM-git-20150109.diff * Fri Jan 09 2015 kukuk@suse.de - Re-add lost patch encryption_method_nis.diff [bnc#906660] * Fri Jan 09 2015 kukuk@suse.de - Update to current git: - Linux-PAM-git-20150109.diff replaces Linux-PAM-git-20140127.diff - obsoletes pam_loginuid-log_write_errors.diff - obsoletes pam_xauth-sigpipe.diff - obsoletes bug-870433_pam_timestamp-fix-directory-traversal.patch * Fri Jan 09 2015 bwiedemann@suse.com - increase process limit to 1200 to help chromium users with many tabs
/etc/environment /etc/pam.d /etc/pam.d/common-account /etc/pam.d/common-auth /etc/pam.d/common-password /etc/pam.d/common-session /etc/pam.d/other /etc/securetty /etc/security /etc/security/access.conf /etc/security/faillock.conf /etc/security/group.conf /etc/security/limits.conf /etc/security/limits.d /etc/security/namespace.conf /etc/security/namespace.init /etc/security/pam_env.conf /etc/security/sepermit.conf /etc/security/time.conf /lib64/libpam.so.0 /lib64/libpam.so.0.84.2 /lib64/libpam_misc.so.0 /lib64/libpam_misc.so.0.82.1 /lib64/libpamc.so.0 /lib64/libpamc.so.0.82.1 /lib64/security /lib64/security/pam_access.so /lib64/security/pam_cracklib.so /lib64/security/pam_debug.so /lib64/security/pam_deny.so /lib64/security/pam_echo.so /lib64/security/pam_env.so /lib64/security/pam_exec.so /lib64/security/pam_faildelay.so /lib64/security/pam_faillock.so /lib64/security/pam_filter /lib64/security/pam_filter.so /lib64/security/pam_filter/upperLOWER /lib64/security/pam_ftp.so /lib64/security/pam_group.so /lib64/security/pam_issue.so /lib64/security/pam_keyinit.so /lib64/security/pam_lastlog.so /lib64/security/pam_limits.so /lib64/security/pam_listfile.so /lib64/security/pam_localuser.so /lib64/security/pam_loginuid.so /lib64/security/pam_mail.so /lib64/security/pam_mkhomedir.so /lib64/security/pam_motd.so /lib64/security/pam_namespace.so /lib64/security/pam_nologin.so /lib64/security/pam_permit.so /lib64/security/pam_pwhistory.so /lib64/security/pam_rhosts.so /lib64/security/pam_rootok.so /lib64/security/pam_securetty.so /lib64/security/pam_selinux.so /lib64/security/pam_sepermit.so /lib64/security/pam_shells.so /lib64/security/pam_stress.so /lib64/security/pam_succeed_if.so /lib64/security/pam_tally2.so /lib64/security/pam_time.so /lib64/security/pam_timestamp.so /lib64/security/pam_tty_audit.so /lib64/security/pam_umask.so /lib64/security/pam_unix.so /lib64/security/pam_unix_acct.so /lib64/security/pam_unix_auth.so /lib64/security/pam_unix_passwd.so /lib64/security/pam_unix_session.so /lib64/security/pam_warn.so /lib64/security/pam_wheel.so /lib64/security/pam_xauth.so /sbin/faillock /sbin/mkhomedir_helper /sbin/pam_tally2 /sbin/pam_timestamp_check /sbin/unix2_chkpwd /sbin/unix_chkpwd /sbin/unix_update /usr/lib/tmpfiles.d/pam.conf /usr/share/doc/packages/pam /usr/share/doc/packages/pam/NEWS /usr/share/licenses/pam /usr/share/licenses/pam/COPYING /usr/share/locale/ar/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/as/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ast/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/be/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/bg/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/bn/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/bn_IN/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ca/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/cs/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/da/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/de/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/de_CH/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/el/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/en_GB/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/eo/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/es/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/et/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/eu/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/fa/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/fi/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/fr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ga/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/gl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/gu/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/he/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/hi/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/hr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/hu/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ia/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/id/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/is/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/it/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ja/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/kk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/km/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/kn/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ko/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/lt/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/lv/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/mai/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/mk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ml/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/mr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/nb/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/nds/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ne/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/nl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/nn/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/or/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pa/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pt/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/pt_BR/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ro/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ru/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sl/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sq/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sr@latin/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/sv/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/ta/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/te/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/th/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/tr/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/uk/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/vi/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/zh_CN/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/zh_HK/LC_MESSAGES/Linux-PAM.mo /usr/share/locale/zh_TW/LC_MESSAGES/Linux-PAM.mo /usr/share/man/man5/access.conf.5.gz /usr/share/man/man5/environment.5.gz /usr/share/man/man5/faillock.conf.5.gz /usr/share/man/man5/group.conf.5.gz /usr/share/man/man5/limits.conf.5.gz /usr/share/man/man5/namespace.conf.5.gz /usr/share/man/man5/pam.conf.5.gz /usr/share/man/man5/pam.d.5.gz /usr/share/man/man5/pam_env.conf.5.gz /usr/share/man/man5/sepermit.conf.5.gz /usr/share/man/man5/time.conf.5.gz /usr/share/man/man8 /usr/share/man/man8/PAM.8.gz /usr/share/man/man8/faillock.8.gz /usr/share/man/man8/mkhomedir_helper.8.gz /usr/share/man/man8/pam.8.gz /usr/share/man/man8/pam_access.8.gz /usr/share/man/man8/pam_cracklib.8.gz /usr/share/man/man8/pam_debug.8.gz /usr/share/man/man8/pam_deny.8.gz /usr/share/man/man8/pam_echo.8.gz /usr/share/man/man8/pam_env.8.gz /usr/share/man/man8/pam_exec.8.gz /usr/share/man/man8/pam_faildelay.8.gz /usr/share/man/man8/pam_faillock.8.gz /usr/share/man/man8/pam_filter.8.gz /usr/share/man/man8/pam_ftp.8.gz /usr/share/man/man8/pam_group.8.gz /usr/share/man/man8/pam_issue.8.gz /usr/share/man/man8/pam_keyinit.8.gz /usr/share/man/man8/pam_lastlog.8.gz /usr/share/man/man8/pam_limits.8.gz /usr/share/man/man8/pam_listfile.8.gz /usr/share/man/man8/pam_localuser.8.gz /usr/share/man/man8/pam_loginuid.8.gz /usr/share/man/man8/pam_mail.8.gz /usr/share/man/man8/pam_mkhomedir.8.gz /usr/share/man/man8/pam_motd.8.gz /usr/share/man/man8/pam_namespace.8.gz /usr/share/man/man8/pam_nologin.8.gz /usr/share/man/man8/pam_permit.8.gz /usr/share/man/man8/pam_pwhistory.8.gz /usr/share/man/man8/pam_rhosts.8.gz /usr/share/man/man8/pam_rootok.8.gz /usr/share/man/man8/pam_securetty.8.gz /usr/share/man/man8/pam_selinux.8.gz /usr/share/man/man8/pam_sepermit.8.gz /usr/share/man/man8/pam_shells.8.gz /usr/share/man/man8/pam_succeed_if.8.gz /usr/share/man/man8/pam_tally2.8.gz /usr/share/man/man8/pam_time.8.gz /usr/share/man/man8/pam_timestamp.8.gz /usr/share/man/man8/pam_timestamp_check.8.gz /usr/share/man/man8/pam_tty_audit.8.gz /usr/share/man/man8/pam_umask.8.gz /usr/share/man/man8/pam_unix.8.gz /usr/share/man/man8/pam_warn.8.gz /usr/share/man/man8/pam_wheel.8.gz /usr/share/man/man8/pam_xauth.8.gz /usr/share/man/man8/unix2_chkpwd.8.gz /usr/share/man/man8/unix_chkpwd.8.gz /usr/share/man/man8/unix_update.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 12:46:04 2024