commit pam_ssh for openSUSE:Factory
Hello community,
here is the log from the commit of package pam_ssh for openSUSE:Factory
checked in at Fri Jul 3 16:10:33 CEST 2009.
--------
--- pam_ssh/pam_ssh.changes 2009-04-14 11:39:56.000000000 +0200
+++ /mounts/work_src_done/STABLE/pam_ssh/pam_ssh.changes 2009-06-24 19:35:05.000000000 +0200
@@ -1,0 +2,5 @@
+Wed Jun 24 19:34:49 CEST 2009 - sbrabec@suse.cz
+
+- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
+
+-------------------------------------------------------------------
calling whatdependson for head-i586
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ pam_ssh.spec ++++++
--- /var/tmp/diff_new_pack.K11843/_old 2009-07-03 16:10:03.000000000 +0200
+++ /var/tmp/diff_new_pack.K11843/_new 2009-07-03 16:10:03.000000000 +0200
@@ -20,11 +20,11 @@
Name: pam_ssh
BuildRequires: openssh openssl-devel pam-devel
-License: BSD 3-Clause
+License: BSD 3-clause (or similar)
Group: Productivity/Networking/SSH
AutoReqProv: on
Version: 1.97
-Release: 1
+Release: 2
Summary: PAM Module for SSH Authentication
Url: http://sourceforge.net/projects/pam-ssh/
Source: %{name}-%{version}.tar.bz2
@@ -72,64 +72,3 @@
%attr(444,root,root) %_mandir/man*/*.*
%changelog
-* Tue Apr 14 2009 anicka@suse.cz
-- update to 1.97
- * pam_get_pass.c: CVE-2009-1273
- pam_ssh used a certain prompt if a user found to exist to ask
- for the SSH passphrase explicitely depending on whether the
- username was valid or invalid, which made it easier for remote
- attackers to enumerate usernames.
-- remove last patch
-* Fri Apr 10 2009 anicka@suse.cz
-- add fix for CVE-2009-1273 (bnc#492764) taken from Red Hat
- bugzilla (#492153)
-* Thu Apr 10 2008 ro@suse.de
-- added baselibs.conf file to build xxbit packages
- for multilib support
-* Mon Jan 14 2008 anicka@suse.cz
-- update to 1.96
- * pam_ssh.c (key_load_private_maybe): New wrapper for
- key_load_private() that checks whether the private key's
- passphrase is blank.
- * pam_ssh.c: if PAM returns tty_raw = NULL we shouldn't fiddle
- with a per-session file. That seems to happen if the session
- module is used for background system services (like cron).
- * pam_ssh.c: fixed double-free issue with file closing
-- remove last two patches (fixed in upstream)
-* Mon Mar 05 2007 anicka@suse.de
-- fix crash in pam_sm_open_session [#251053]
-* Fri Nov 24 2006 max@suse.de
-- Fix crashes in in the session module (#223488).
-* Tue Nov 07 2006 ro@suse.de
-- fix manpage permissions
-* Thu Aug 03 2006 stark@suse.de
-- update to version 1.94 (r23)
- * improved logging
- * more recover fixes
- * root credentials weren't restored in some cases which caused
- following pam session modules to fail
-* Sat Jun 24 2006 stark@suse.de
-- update to version 1.93 (r18)
- * debug option works for auth and session module (#177885)
- * debug option is really available now for auth and session
- module (#177885)
- * recover better if close_session wasn't executed (#187560)
-* Wed Jun 07 2006 stark@suse.de
-- logging fix is integrated now
-- auth handler now accepts nullok option
-* Wed May 31 2006 stark@suse.de
-- update to version 1.92
- * allow working as session module without authentication
- (workaround for #173803)
- * incorporated include fixes
-- fixed syslog logging (part of #177885)
-* Wed Jan 25 2006 mls@suse.de
-- converted neededforbuild to BuildRequires
-* Fri Oct 14 2005 ro@suse.de
-- added include openssl/md5.h to cipher.c
-* Mon Oct 10 2005 schubi@suse.de
-- added "include
participants (1)
-
root@Hilbert.suse.de