pam-extra-32bit-1.3.0-lp152.11.6.1 4>$  Ap_g#/=„m]oeiiFᒃR(|g9̂*.WcxoGg@ZN-6]4;#*w i0{- >M>\v&guU)퐽ޙsb @LYUZ|JL)M1U #y`rAŃn5e%9q­BǞ!-N^5mǍ4褕)88o}֥œ LQ5=RFXhJOvfNk,|mL@lI13874513a7a1085079bc61236a3e6f2383a83d29d7ea1ccc247f72d731544fa2ca64cb2a6889f906bc072390dd9764bdd5f838112_g#/=„4Zv7)s~*_Ak`o]ŐBHb(H3pVV`U/ zn9?;X5j*w z~~N͊~|3بh)KZ7lA$鯛a:r5 TF4 }>p%AĠ ,MIiA $1;뎿f R!ggY;W-_^jb<N3s#ʡA;Kj%v7D>p>|?ld % \ 3MSZlt x |    4t(89d:#>SG\HdIlXpYx\]^bcde$f'l)u<vDwxy  &hCpam-extra-32bit1.3.0lp152.11.6.1PAM module to authenticate against a separate databasePAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policies without having to recompile programs that do authentication. This package contains useful extra modules eg pam_userdb which is used to verify a username/password pair against values stored in a Berkeley DB database._gbuild705openSUSE Leap 15.2openSUSEGPL-2.0+ or BSD-3-Clausehttp://bugs.opensuse.orgSystem/Libraries%descriptionhttp://www.linux-pam.org/linuxx86_64/sbin/ldconfig5A_g_g7131f9bd3de4f168d2d575b2bddc8bbada0f51b4514785f46e48704d5c3c8f18rootrootrootrootpam-1.3.0-lp152.11.6.1.src.rpmpam-extra-32bitpam-extra-32bit(x86-32)@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcrypt.so.1libcrypt.so.1(GLIBC_2.0)libdb-4.8.solibpam.so.0libpam.so.0(LIBPAM_1.0)libpam.so.0(LIBPAM_EXTENSION_1.0)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1_^@_ _u@_9^t@^ku^O@[[;@ZZ@ZYY@X6@XIK@W@WW'A@W!@W@W VbVbVn@V@Uz@U>U>$TTTJosef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Marcus Meissner Josef Möllers josef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comfvogt@suse.comschwab@suse.dejosef.moellers@suse.comjosef.moellers@suse.comdevelop7@develop7.infokukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dejoschibrauchle@gmx.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.debwiedemann@suse.com- pam_cracklib: added code to check whether the password contains a substring of of the user's name of at least characters length in some form. This is enabled by the new parameter "usersubstr=" See https://github.com/libpwquality/libpwquality/commit/bfef79dbe6aa525e9557bf4b0a61e6dde12749c4 [jsc#SLE-16719, jsc#SLE-16720, pam-pam_cracklib-add-usersubstr.patch]- pam_xauth.c: do not free() a string which has been (successfully) passed to putenv(). [bsc#1177858, pam-bsc1177858-dont-free-environment-string.patch]- Initialize pam_unix pam_sm_acct_mgmt() local variable "daysleft" to avoid spurious (and misleading) Warning: your password will expire in ... days. fixed upstream with commit db6b293046a [bsc#1178727, pam-bsc1178727-initialize-daysleft.patch]- /usr/bin/xauth chokes on the old user's $HOME being on an NFS file system. Run /usr/bin/xauth using the old user's uid/gid Patch courtesy of Dr. Werner Fink. [bsc#1174593, pam-xauth_ownership.patch]- Moved pam_userdb to a separate package pam-extra. [bsc#1166510, pam.spec]- disable libdb usage and pam_userdb again, as this causes some license conflicts. (bsc#1166510)- Add libdb as build-time dependency to enable pam_userdb module. Enable pam_userdb.so [jsc#sle-7258, bsc#1164562, pam.spec]- When comparing an incoming IP address with an entry in access.conf that only specified a single host (ie no netmask), the incoming IP address was used rather than the IP address from access.conf, effectively comparing the incoming address with itself. (Also fixed a small typo while I was at it) [bsc#1115640, use-correct-IP-address.patch, CVE-2018-17953]- Remove limits for nproc from /etc/security/limits.conf ie remove pam-limit-nproc.patch [bsc#1110700, pam-limit-nproc.patch]- pam_umask.8 needed to be patched as well. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Changed order of configuration files to reflect actual code. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Use %license (boo#1082318)- Prerequire group(shadow), user(root)- Allow symbolic hostnames in access.conf file. [pam-hostnames-in-access_conf.patch, boo#1019866]- Increased nproc limits for non-privileged users to 4069/16384. Removed limits for "root". [pam-limit-nproc.patch, bsc#1012494, bsc#1013706]- pam-limit-nproc.patch: increased process limit to help Chrome/Chromuim users with really lots of tabs. New limit gets closer to UserTasksMax parameter in logind.conf- Add doc directory to filelist.- Remove obsolete README.pam_tally [bsc#977973]- Update Linux-PAM to version 1.3.0 - Rediff encryption_method_nis.diff - Link pam_unix against libtirpc and external libnsl to enable IPv6 support.- Add /sbin/unix2_chkpwd (moved from pam-modules)- Remove (since accepted upstream): - 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - 0002-Remove-enable-static-modules-option-and-support-from.patch - 0003-fix-nis-checks.patch - 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch- Add 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch - Replace IPv4 only functions- Fix typo in common-account.pamd [bnc#959439]- Add 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - readd PAM_EXTERN for external PAM modules- Add 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - Add 0002-Remove-enable-static-modules-option-and-support-from.patch - Add 0003-fix-nis-checks.patch- Add folder /etc/security/limits.d as mentioned in 'man pam_limits'- Update to version 1.2.1 - security update for CVE-2015-3238- Update to version 1.2.0 - obsoletes Linux-PAM-git-20150109.diff- Re-add lost patch encryption_method_nis.diff [bnc#906660]- Update to current git: - Linux-PAM-git-20150109.diff replaces Linux-PAM-git-20140127.diff - obsoletes pam_loginuid-log_write_errors.diff - obsoletes pam_xauth-sigpipe.diff - obsoletes bug-870433_pam_timestamp-fix-directory-traversal.patch- increase process limit to 1200 to help chromium users with many tabs/bin/sh1.3.0-lp152.11.6.11.3.0-lp152.11.6.1securitypam_userdb.so/lib//lib/security/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15239/openSUSE_Leap_15.2_Update/0d8c1162349bb546454dee4057920ac7-pam.openSUSE_Leap_15.2_Updatecpioxz5x86_64-suse-linuxdirectoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=0828db6ecb085180bdd347e0939e09466feb569d, stripped RRRRRR R RRR Rutf-842a07a995cd0bcc2cdaf71300426da171111b634019d887681b3b66a0baa3d82? 7zXZ !t/7C] crt:bLL 77;]<xnD&O_EVUع7as4rAӞr lD驟аMNh8FU(8T&iڛb@Rip!5dO4u"p>I)r4=MBޟxcs$um\{coeP)pD飗_TOM%x>u$ ޭi&fؒ3̎9ԷmyG~ GGԘLU'fJ䯽Zǥm:e RmŚTM>lAƙ)&t8ʻ uZu&xENԣ/S(Y422ӕߡAl!^: 6=HdL1:A>+HW4Whv789 @P.fځ"ﵓe$oH$oQ2Ij^K:wLHbD(%`3vp=#J2bWp݁!jPRAS`=\K-JoG>%a$E㢓%M 8p$)@2W`Mܩ=J]Sݦ^`$|GbDY8HL\=Av01TI!8b?D[n=K}q,^PRX `$|^x`OvU ,?>!RaA{#ʲ7ЯZumXDlٓ#i3̡>34hsy x 0YP$Z}UN8ZU4pmx2FZިR+nI &Go;L /)3^kI ~~ wsّI6,\7-hUﳮڐ/3 dI{{+Lk"&< Mrny|@l:y}󝫃lh`?|71hlHD#ԗb|&0]$v࠻nA}2gI+뭚<2,ޒIYp$ƍ{YpЁ?=oߘ$Pk,MiHETẒw,W = ?^;6.2+ߺzݠFJV^ NCwRO.a t#H P"_ϠTvoI4|7:FgTsI ={{ʫ \_U~H5*ݾ|%s0_g>~lj> x&= гG&DMh!%1=ry|205]BܞA/i+};mxΠi QTߦ* k)Rdɨ5 2y(ۨܙLк kSbTwyJO0dϔ[i9HQO N'Ca pq!^_˅ ̙Y7j=\l{jDiC{(.ʇqJ0o<3K%(~ o)F?-5v/%ezᶎGOnHR:lB?qs5ehI\7jFc2b/&ڨjXzEYEt(sv)wU6 핲L٧]sIx! {lQKCtfk^N󻼬@Y$MAq= 2Ն+:^K Qlҫj tnm{3 3ܡi.Ϩf: )-CBX@3t:L]dm]$ۍJM}9JZyPYSL=Ujַv+}u۸!&?0CuK)ĢYaL}mWPK|M Lr-].߫J(t=*fv}br!-Zp0e7(󖌪:wA511*^褜s/?,;dǦI;iARI,o*yoPldz&ܔ4EwxԼzyRoפr#g7ֳ5et 1)yA^D(N>Ju7tIէdVdO{&bpD(dLD43|;]7 8UQ}9!KZD tMwBABt!uȻCK5 %_5&RtZT<*A.~XC.9֍Hi9HrE{PIMH0L>J4r1-UAN%b-Goem^r!b[r#W9,_$p6g8Y@㵰eqmP)^J9=Q`.4jMy@RVf* úEzutWj/ `մIc964kR‚E*s8Â2D$Mφ\գk28cvCoBW.iyx;֫'HB9_..{Zrs Y CfvMK,U1LVLzҬs#W.cT=8b gR-0C1>-w~?a01(g8D_&*A_O]DŽ.˄Waֱ&nJ&f YZ