pam-extra-32bit-1.3.0-150000.6.61.1 >  A c: p9|0l7O~pP)"&v$4 )Q~ p Ϧl*4Vud.^59@(;ɕ>hm:&FSV|+_utYY fm(/\h d$ /&XPE+D{}fymk.ҭISXuI[~\;B.pG#Eh0$Tz,bàe=6Rdbl=|CAYcC8-Γ{$[At{-uZ!!%r߻ \h]d1WzLW7H>p>&?%d & ] 1Nhnu     $L(8-9-: N->"G"H#I# X#Y#\#@]#H^#_b#tc$2d$e$f$l$u$v$w%hx%py%x %%%%Cpam-extra-32bit1.3.0150000.6.61.1PAM module to authenticate against a separate databasePAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policies without having to recompile programs that do authentication. This package contains useful extra modules eg pam_userdb which is used to verify a username/password pair against values stored in a Berkeley DB database.c:sheep645SUSE Linux Enterprise 15SUSE LLC GPL-2.0+ or BSD-3-Clausehttps://www.suse.com/System/Libraries%descriptionhttp://www.linux-pam.org/linuxx86_64/sbin/ldconfig5Ac:c:d2ce9ada354feeb2fb384578f695250ecb9624159bbb83310cc15ebdeee0594arootrootrootrootpam-1.3.0-150000.6.61.1.src.rpmpam-extra-32bitpam-extra-32bit(x86-32)@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcrypt.so.1libcrypt.so.1(GLIBC_2.0)libdb-4.8.solibpam.so.0libpam.so.0(LIBPAM_1.0)libpam.so.0(LIBPAM_EXTENSION_1.0)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1cbF@b1@bs@aqV@aha]a/k@a&0`q`lM@`H`!'`_^@_ _u@_9^t@^ku^O@[[;@ZZ@ZYY@X6@XIK@W@WW'A@W!@W@W VbVbVn@V@Uz@U>U>$TTTvalentin.lefebvre@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.commeissner@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comfvogt@suse.comschwab@suse.dejosef.moellers@suse.comjosef.moellers@suse.comdevelop7@develop7.infokukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dejoschibrauchle@gmx.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.debwiedemann@suse.com- Update pam_motd to the most current version. This fixes various issues and adds support for mot.d directories [jsc#PED-1712]. * Added: pam-ped1712-pam_motd-directory-feature.patch- Do not include obsolete libselinux header files flask.h and av_permissions.h. [bsc#1197794, pam-bsc1197794-do-not-include-obsolete-header-files.patch]- Between allocating the variable "ai" and free'ing them, there are two "return NO" were we don't free this variable. This patch inserts freaddrinfo() calls before the "return NO;"s. [bsc#1197024, pam-bsc1197024-free-addrinfo-before-return.patch]- Define _pam_vendordir as "/%{_sysconfdir}/pam.d" The variable is needed by systemd and others. [bsc#1196093, macros.pam]- Corrected a bad directive file which resulted in the "securetty" file to be installed as "macros.pam". [pam.spec]- Added tmpfiles for pam to set up directory for pam_faillock. [pam.conf]- Corrected macros.pam entry for %_pam_moduledir Cleanup in pam.spec: * Replaced all references to ${_lib}/security in pam.spec by %{_pam_moduledir} * Removed definition of (unused) "amdir".- Added new file macros.pam on request of systemd. [bsc#1190052, macros.pam]- Added pam_faillock to the set of modules. [jsc#sle-20638, pam-sle20638-add-pam_faillock.patch]- In the 32-bit compatibility package for 64-bit architectures, require "systemd-32bit" to be also installed as it contains pam_systemd.so for 32 bit applications. [bsc#1185562, baselibs.conf]- If "LOCAL" is configured in access.conf, and a login attempt from a remote host is made, pam_access tries to resolve "LOCAL" as a hostname and logs a failure. Checking explicitly for "LOCAL" and rejecting access in this case resolves this issue. [bsc#1184358, bsc1184358-prevent-LOCAL-from-being-resolved.patch]- pam_limits: "unlimited" is not a legitimate value for "nofile" (see setrlimit(2)). So, when "nofile" is set to one of the "unlimited" values, it is set to the contents of "/proc/sys/fs/nr_open" instead. Also changed the manpage of pam_limits to express this. [bsc#1181443, pam-bsc1181443-make-nofile-unlimited-mean-nr_open.patch]- Add a definition for pamdir to pam.spec So that a proper contents of macros.pam can be constructed. [pam.spec]- Create macros.pam with definition of %_pamdir so packages which are commonly shared between Factory and SLE can use this macro [pam.spec]- pam_cracklib: added code to check whether the password contains a substring of of the user's name of at least characters length in some form. This is enabled by the new parameter "usersubstr=" See https://github.com/libpwquality/libpwquality/commit/bfef79dbe6aa525e9557bf4b0a61e6dde12749c4 [jsc#SLE-16719, jsc#SLE-16720, pam-pam_cracklib-add-usersubstr.patch]- pam_xauth.c: do not free() a string which has been (successfully) passed to putenv(). [bsc#1177858, pam-bsc1177858-dont-free-environment-string.patch]- Initialize pam_unix pam_sm_acct_mgmt() local variable "daysleft" to avoid spurious (and misleading) Warning: your password will expire in ... days. fixed upstream with commit db6b293046a [bsc#1178727, pam-bsc1178727-initialize-daysleft.patch]- /usr/bin/xauth chokes on the old user's $HOME being on an NFS file system. Run /usr/bin/xauth using the old user's uid/gid Patch courtesy of Dr. Werner Fink. [bsc#1174593, pam-xauth_ownership.patch]- Moved pam_userdb to a separate package pam-extra. [bsc#1166510, pam.spec]- disable libdb usage and pam_userdb again, as this causes some license conflicts. (bsc#1166510)- Add libdb as build-time dependency to enable pam_userdb module. Enable pam_userdb.so [jsc#sle-7258, bsc#1164562, pam.spec]- When comparing an incoming IP address with an entry in access.conf that only specified a single host (ie no netmask), the incoming IP address was used rather than the IP address from access.conf, effectively comparing the incoming address with itself. (Also fixed a small typo while I was at it) [bsc#1115640, use-correct-IP-address.patch, CVE-2018-17953]- Remove limits for nproc from /etc/security/limits.conf ie remove pam-limit-nproc.patch [bsc#1110700, pam-limit-nproc.patch]- pam_umask.8 needed to be patched as well. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Changed order of configuration files to reflect actual code. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Use %license (boo#1082318)- Prerequire group(shadow), user(root)- Allow symbolic hostnames in access.conf file. [pam-hostnames-in-access_conf.patch, boo#1019866]- Increased nproc limits for non-privileged users to 4069/16384. Removed limits for "root". [pam-limit-nproc.patch, bsc#1012494, bsc#1013706]- pam-limit-nproc.patch: increased process limit to help Chrome/Chromuim users with really lots of tabs. New limit gets closer to UserTasksMax parameter in logind.conf- Add doc directory to filelist.- Remove obsolete README.pam_tally [bsc#977973]- Update Linux-PAM to version 1.3.0 - Rediff encryption_method_nis.diff - Link pam_unix against libtirpc and external libnsl to enable IPv6 support.- Add /sbin/unix2_chkpwd (moved from pam-modules)- Remove (since accepted upstream): - 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - 0002-Remove-enable-static-modules-option-and-support-from.patch - 0003-fix-nis-checks.patch - 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch- Add 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch - Replace IPv4 only functions- Fix typo in common-account.pamd [bnc#959439]- Add 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - readd PAM_EXTERN for external PAM modules- Add 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - Add 0002-Remove-enable-static-modules-option-and-support-from.patch - Add 0003-fix-nis-checks.patch- Add folder /etc/security/limits.d as mentioned in 'man pam_limits'- Update to version 1.2.1 - security update for CVE-2015-3238- Update to version 1.2.0 - obsoletes Linux-PAM-git-20150109.diff- Re-add lost patch encryption_method_nis.diff [bnc#906660]- Update to current git: - Linux-PAM-git-20150109.diff replaces Linux-PAM-git-20140127.diff - obsoletes pam_loginuid-log_write_errors.diff - obsoletes pam_xauth-sigpipe.diff - obsoletes bug-870433_pam_timestamp-fix-directory-traversal.patch- increase process limit to 1200 to help chromium users with many tabs/bin/sh1.3.0-150000.6.61.11.3.0-150000.6.61.1securitypam_userdb.so/lib//lib/security/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:26244/SUSE_SLE-15_Update/6e0a33679f517a09a0ff049f575e34e9-pam.SUSE_SLE-15_Updatecpioxz5x86_64-suse-linuxdirectoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=18f2c098bf9441599e483e5c7eaadc6ba4e4115c, stripped RRRRRR R RRR Rutf-886dceffbfb54a047b181dce75e95fe0d52f9e9b47465179cea817ee683fc626c? 7zXZ !t/7G] crt:bLL #WX 1&1 EI ሌ%怈(9"KL^aN(?,Ӎl;4B-=$]ÉX}hb1Jd*h09?>nq+MvD\H."syrved@yujijjBu^o`U՞"W4FVS9_ Xn_[@)(?u cgپgS-.)ȵޓ85Ϯ^1<J(n^mFS:dM")J:;pGE4 .M̲~Rvc+6sT$aM&t#M^2)s\#H5zc#sѦvUja;?6PwG.An0VJp/*zT@>R5 X\Pd{ <ؖ)if+Փ:d,F/YZ!=6KѲ,/JJSve&GN:GG< @os>w-jEiR a-Ե0Pw- mޛ]zr3Lp*wQ+(A 3[k7*+xD3XIK&#pTM vqę꤯LSA\iУ,*=ՃyWY*4L~>2J(xT($!Jغg(PQûK%L1{4J7&ު4,QaT{a S&IA/#•EHkmZV-MDrI]ERWqwEy"&m% ) BCaך3CJ^HD~IoD;4\b~M|a i#8ȾEwQNœ3n%k'JbƧ9ҀkSA3`trcA}ШC717y=sT] $&QN`N&Ƅ ,z. ʹҊު9̿ ÉE@TE/"h)wĜӓlkK\XU3a=5ZK `|92M%XMic`sd%?* Y2ڥ Qo\`*_g*ˈlgy֋6(} ( oJnHt"ɴH11\LaL_J4" &aj%SF8ߣa_ aiK(␉аDd[VU&q9ڽ GCG֌r{. %h_U7~u (,عg{؍@_YH<F>u*0'4{;/=8/X1*eso0Ņ7 <\]BX*qFzpf kE^8υz5&y/zKv1$~ܧO)74Em]llY\FAF[0pDsvf\@4ckY%iblHa߇[ ztP}_P(Nieʮ$t]/lYwKDg̅-{OAmk'[0~'A'I@ɢ9[zvyklFTtM_ AOOS.w[m¯Ĭ| 91w(5ݘSX$tlF~5l^J)r;|bT@~<|+?%Yn ,㢡T@K`r\vzشueD~xXz$ww6N-TY! P&tˏB̛gk|2ݮ*,S+EkRF>.ZJvS*g닾3Sy=&&wzW.%SYNP;t$%r|]tN"|.fHA2Pfi,dA[Ԟ[F %Otxpsv^Jwk7i){NɯDg YW\raBD*: IU(%Sqd>_U~E)H0.дd#m&y*:u=D,5E e\]8Tlk_OI<G[f#^zxqbצR:.8aQ[.IKI*JMĘ``&UQZtHAL{@We׷<$kzϥ+I+mYfov$;ɩyчKm`J]_DCwvY00kqu"}^jax?cVimZJBto0TQ *~ EvwvR_);?_(|ZB =l%vt:S Y@=L~?}5ssyh-\x}0S39XBZ1X"@?Jܼ<4!;#0\AX$gWgPN{7(IilvOS[mېEJO壠hO /$D.|e1%dB#""rfGެRj=W2[} QI+0f֪oo .@ .&%t vrv@0w>[Qүe5&`fυr'rcKmC̦ @߁ﻀ#_3#oqat`幷Lk`e).6K?r`@=@N 6Հ*/ϤF|si%8fM ^{*P E3ޑ>@ aW!Զk5ak/bS,% ~XKYc*ї,p3qbTlkYIÿEI+*f*bp?mCQRlv#mW9:f0#k =ȈvCF (I+ID%Ӧ48AfK~0nǖ2Uwt2#)sIM![ʎQcDǼZ;l,U͞Eg7GP,9½$[G1q:O鶜/KAq1"Px(xiBv@ҮuQ܊o5(|D:9p"`%cՑXObYS/2NZxQOp+%@Z΃k[CCc~.P|u