A Security Tool that Provides Authentication for Applications

Edit Package pam

PAM (Pluggable Authentication Modules) is a system security tool that
allows system administrators to set authentication policies without
having to recompile programs that do authentication.

Refresh
Refresh
Source Files
Filename Size Changed
Linux-PAM-1.5.0-docs.tar.xz 0000441644 431 KB
Linux-PAM-1.5.0.tar.xz 0000972228 949 KB
_service 0000000514 514 Bytes
_servicedata 0000000221 221 Bytes
baselibs.conf 0000000039 39 Bytes
common-account.pamd 0000000380 380 Bytes
common-auth.pamd 0000000462 462 Bytes
common-password.pamd 0000000435 435 Bytes
common-session.pamd 0000000482 482 Bytes
other.pamd 0000000251 251 Bytes
pam-bsc1177858-dont-free-environment-string.patch 0000000965 965 Bytes
pam-hostnames-in-access_conf.patch 0000004623 4.51 KB
pam-limit-nproc.patch 0000000412 412 Bytes
pam-login_defs-check.sh 0000001405 1.37 KB
pam-pam_cracklib-add-usersubstr.patch 0000002249 2.2 KB
pam-xauth_ownership.patch 0000003385 3.31 KB
pam.changes 0000066060 64.5 KB
pam.spec 0000014976 14.6 KB
pam_cracklib-removal.patch 0000055086 53.8 KB
pam_tally2-removal.patch 0000041671 40.7 KB
securetty 0000000161 161 Bytes
unix2_chkpwd.8 0000001739 1.7 KB
unix2_chkpwd.c 0000006885 6.72 KB
Revision 107 (latest revision is 138)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 849468 from Thorsten Kukuk's avatar Thorsten Kukuk (kukuk) (revision 107)
- Update to 1.5.0
  - obsoletes pam-bsc1178727-initialize-daysleft.patch
  - Multiple minor bug fixes, portability fixes, and documentation improvements.
  - Extended libpam API with pam_modutil_check_user_in_passwd function.
  - pam_faillock: changed /run/faillock/$USER permissions from 0600 to 0660.
  - pam_motd: read motd files with target user credentials skipping unreadable ones.
  - pam_pwhistory: added a SELinux helper executable.
  - pam_unix, pam_usertype: implemented avoidance of certain timing attacks.
  - pam_wheel: implemented PAM_RUSER fallback for the case when getlogin fails.
  - pam_env: Reading of the user environment is deprecated and will be removed
             at some point in the future.
  - libpam: pam_modutil_drop_priv() now correctly sets the target user's
    supplementary groups, allowing pam_motd to filter messages accordingly
- Refresh pam-xauth_ownership.patch
- pam_tally2-removal.patch: Re-add pam_tally2 for deprecated sub-package
- pam_cracklib-removal.patch: Re-add pam_cracklib for deprecated sub-package

- pam_cracklib: added code to check whether the password contains
  a substring of of the user's name of at least <N> characters length
  in some form.
  This is enabled by the new parameter "usersubstr=<N>"
  See https://github.com/libpwquality/libpwquality/commit/bfef79dbe6aa525e9557bf4b0a61e6dde12749c4
  [jsc#SLE-16719, jsc#SLE-16720, pam-pam_cracklib-add-usersubstr.patch]

- pam_xauth.c: do not free() a string which has been (successfully)
  passed to putenv().
  [bsc#1177858, pam-bsc1177858-dont-free-environment-string.patch]

- Initialize pam_unix pam_sm_acct_mgmt() local variable "daysleft"
  to avoid spurious (and misleading)
Comments 0
openSUSE Build Service is sponsored by