[ubuntu/jaunty] pam 1.0.1-5ubuntu2 (Accepted)

Steve Langasek steve.langasek at ubuntu.com
Sat Feb 28 00:35:24 GMT 2009


pam (1.0.1-5ubuntu2) jaunty; urgency=low

  * New patch dont_freeze_password_chain, cherry-picked from upstream:
    don't always follow the same path through the password stack on
    the PAM_UPDATE_AUTHTOK pass as was used in the PAM_PRELIM_CHECK
    pass; this Linux-PAM deviation from the original PAM spec causes a
    number of problems, in particular causing wrong return values when
    using the refactored pam-auth-update stack.  LP: #303515, #305882.

Date: Fri, 27 Feb 2009 16:20:24 -0800
Changed-By: Steve Langasek <steve.langasek at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Steve Langasek <steve.langasek at canonical.com>
https://launchpad.net/ubuntu/jaunty/+source/pam/1.0.1-5ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 27 Feb 2009 16:20:24 -0800
Source: pam
Binary: libpam0g libpam-modules libpam-runtime libpam0g-dev libpam-cracklib libpam-doc
Architecture: source
Version: 1.0.1-5ubuntu2
Distribution: jaunty
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Langasek <steve.langasek at ubuntu.com>
Description: 
 libpam-cracklib - PAM module to enable cracklib support
 libpam-doc - Documentation of PAM
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam-runtime - Runtime support for the PAM library
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Launchpad-Bugs-Fixed: 303515 305882
Changes: 
 pam (1.0.1-5ubuntu2) jaunty; urgency=low
 .
   * New patch dont_freeze_password_chain, cherry-picked from upstream:
     don't always follow the same path through the password stack on
     the PAM_UPDATE_AUTHTOK pass as was used in the PAM_PRELIM_CHECK
     pass; this Linux-PAM deviation from the original PAM spec causes a
     number of problems, in particular causing wrong return values when
     using the refactored pam-auth-update stack.  LP: #303515, #305882.
Checksums-Sha1: 
 bcfe269e9a4774a07edd2b05c7241cce3fa517b5 1593 pam_1.0.1-5ubuntu2.dsc
 b2f954ed63785fce89e9b598d78c0b19159893c3 166639 pam_1.0.1-5ubuntu2.diff.gz
Checksums-Sha256: 
 f42f1d3d49cc83e3178360332c5ff01d8823284dd6e29d0e3accad88e7ffc8f5 1593 pam_1.0.1-5ubuntu2.dsc
 dd7deb66b80a46a19d1abc8a77c452e36b537c8f89dbedc326b608316c3e80cb 166639 pam_1.0.1-5ubuntu2.diff.gz
Files: 
 2c7d82a380ca5b81201d6c990593634a 1593 libs optional pam_1.0.1-5ubuntu2.dsc
 d8db063a794b4374d6d02b5265857b30 166639 libs optional pam_1.0.1-5ubuntu2.diff.gz
Original-Maintainer: Steve Langasek <vorlon at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJqIUAKN6ufymYLloRAg5iAJ9ezg2UASzl9aOzDXAyFoNMszBanwCgj8ua
MSb4kJyl09k5lfvHLZT8fgA=
=w8LL
-----END PGP SIGNATURE-----


More information about the Jaunty-changes mailing list