pam-extra-32bit-1.3.0-6.47.1 >  A ai2p9| R]2ά Ya&J&SH."i2ƬT(3;1]~XBLLe uSq#Էћe,-m6&.mu M̨[ZKXQ[y/dIlf $5g^ȏZ QUYȆI VKXG2fk*`f٣Za!Xcff98a917cf7253188f57c6c7123d809d4fc3c287a5b4259f497472ebf4a239c3c0ab7dcbecd34ebad12e02c82510e786a9a100d89<ai2p9|:lk^5,_Ij$Ly*7T"*䟉sǚ4arŘ耢lskOm"2'a ) ,kG .}xU2FcOv-i *>|f(U3 p7'@7hZ=K Jh5 t7@>p>"?"d  V -Jdjq     D(8(9(:(>GH$I,X0Y8\T]\^sbc Fd e f l u v w!|x!y! !!!"Cpam-extra-32bit1.3.06.47.1PAM module to authenticate against a separate databasePAM (Pluggable Authentication Modules) is a system security tool that allows system administrators to set authentication policies without having to recompile programs that do authentication. This package contains useful extra modules eg pam_userdb which is used to verify a username/password pair against values stored in a Berkeley DB database.ai2sheep125SUSE Linux Enterprise 15SUSE LLC GPL-2.0+ or BSD-3-Clausehttps://www.suse.com/System/Libraries%descriptionhttp://www.linux-pam.org/linuxx86_64/sbin/ldconfig5Aai2ai2099ecb7077a0d2fae6d08dab9b0c6e853d0c0e067cf98e60957a1faabb7bd8aarootrootrootrootpam-1.3.0-6.47.1.src.rpmpam-extra-32bitpam-extra-32bit(x86-32)@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcrypt.so.1libcrypt.so.1(GLIBC_2.0)libdb-4.8.solibpam.so.0libpam.so.0(LIBPAM_1.0)libpam.so.0(LIBPAM_EXTENSION_1.0)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1aha]a/k@a&0`q`lM@`H`!'`_^@_ _u@_9^t@^ku^O@[[;@ZZ@ZYY@X6@XIK@W@WW'A@W!@W@W VbVbVn@V@Uz@U>U>$TTTjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.commeissner@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comjosef.moellers@suse.comfvogt@suse.comschwab@suse.dejosef.moellers@suse.comjosef.moellers@suse.comdevelop7@develop7.infokukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.dejoschibrauchle@gmx.dekukuk@suse.dekukuk@suse.dekukuk@suse.dekukuk@suse.debwiedemann@suse.com- Added tmpfiles for pam to set up directory for pam_faillock. [pam.conf]- Corrected macros.pam entry for %_pam_moduledir Cleanup in pam.spec: * Replaced all references to ${_lib}/security in pam.spec by %{_pam_moduledir} * Removed definition of (unused) "amdir".- Added new file macros.pam on request of systemd. [bsc#1190052, macros.pam]- Added pam_faillock to the set of modules. [jsc#sle-20638, pam-sle20638-add-pam_faillock.patch]- In the 32-bit compatibility package for 64-bit architectures, require "systemd-32bit" to be also installed as it contains pam_systemd.so for 32 bit applications. [bsc#1185562, baselibs.conf]- If "LOCAL" is configured in access.conf, and a login attempt from a remote host is made, pam_access tries to resolve "LOCAL" as a hostname and logs a failure. Checking explicitly for "LOCAL" and rejecting access in this case resolves this issue. [bsc#1184358, bsc1184358-prevent-LOCAL-from-being-resolved.patch]- pam_limits: "unlimited" is not a legitimate value for "nofile" (see setrlimit(2)). So, when "nofile" is set to one of the "unlimited" values, it is set to the contents of "/proc/sys/fs/nr_open" instead. Also changed the manpage of pam_limits to express this. [bsc#1181443, pam-bsc1181443-make-nofile-unlimited-mean-nr_open.patch]- Add a definition for pamdir to pam.spec So that a proper contents of macros.pam can be constructed. [pam.spec]- Create macros.pam with definition of %_pamdir so packages which are commonly shared between Factory and SLE can use this macro [pam.spec]- pam_cracklib: added code to check whether the password contains a substring of of the user's name of at least characters length in some form. This is enabled by the new parameter "usersubstr=" See https://github.com/libpwquality/libpwquality/commit/bfef79dbe6aa525e9557bf4b0a61e6dde12749c4 [jsc#SLE-16719, jsc#SLE-16720, pam-pam_cracklib-add-usersubstr.patch]- pam_xauth.c: do not free() a string which has been (successfully) passed to putenv(). [bsc#1177858, pam-bsc1177858-dont-free-environment-string.patch]- Initialize pam_unix pam_sm_acct_mgmt() local variable "daysleft" to avoid spurious (and misleading) Warning: your password will expire in ... days. fixed upstream with commit db6b293046a [bsc#1178727, pam-bsc1178727-initialize-daysleft.patch]- /usr/bin/xauth chokes on the old user's $HOME being on an NFS file system. Run /usr/bin/xauth using the old user's uid/gid Patch courtesy of Dr. Werner Fink. [bsc#1174593, pam-xauth_ownership.patch]- Moved pam_userdb to a separate package pam-extra. [bsc#1166510, pam.spec]- disable libdb usage and pam_userdb again, as this causes some license conflicts. (bsc#1166510)- Add libdb as build-time dependency to enable pam_userdb module. Enable pam_userdb.so [jsc#sle-7258, bsc#1164562, pam.spec]- When comparing an incoming IP address with an entry in access.conf that only specified a single host (ie no netmask), the incoming IP address was used rather than the IP address from access.conf, effectively comparing the incoming address with itself. (Also fixed a small typo while I was at it) [bsc#1115640, use-correct-IP-address.patch, CVE-2018-17953]- Remove limits for nproc from /etc/security/limits.conf ie remove pam-limit-nproc.patch [bsc#1110700, pam-limit-nproc.patch]- pam_umask.8 needed to be patched as well. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Changed order of configuration files to reflect actual code. [bsc#1089884, pam-fix-config-order-in-manpage.patch]- Use %license (boo#1082318)- Prerequire group(shadow), user(root)- Allow symbolic hostnames in access.conf file. [pam-hostnames-in-access_conf.patch, boo#1019866]- Increased nproc limits for non-privileged users to 4069/16384. Removed limits for "root". [pam-limit-nproc.patch, bsc#1012494, bsc#1013706]- pam-limit-nproc.patch: increased process limit to help Chrome/Chromuim users with really lots of tabs. New limit gets closer to UserTasksMax parameter in logind.conf- Add doc directory to filelist.- Remove obsolete README.pam_tally [bsc#977973]- Update Linux-PAM to version 1.3.0 - Rediff encryption_method_nis.diff - Link pam_unix against libtirpc and external libnsl to enable IPv6 support.- Add /sbin/unix2_chkpwd (moved from pam-modules)- Remove (since accepted upstream): - 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - 0002-Remove-enable-static-modules-option-and-support-from.patch - 0003-fix-nis-checks.patch - 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch- Add 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch - Replace IPv4 only functions- Fix typo in common-account.pamd [bnc#959439]- Add 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch - readd PAM_EXTERN for external PAM modules- Add 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch - Add 0002-Remove-enable-static-modules-option-and-support-from.patch - Add 0003-fix-nis-checks.patch- Add folder /etc/security/limits.d as mentioned in 'man pam_limits'- Update to version 1.2.1 - security update for CVE-2015-3238- Update to version 1.2.0 - obsoletes Linux-PAM-git-20150109.diff- Re-add lost patch encryption_method_nis.diff [bnc#906660]- Update to current git: - Linux-PAM-git-20150109.diff replaces Linux-PAM-git-20140127.diff - obsoletes pam_loginuid-log_write_errors.diff - obsoletes pam_xauth-sigpipe.diff - obsoletes bug-870433_pam_timestamp-fix-directory-traversal.patch- increase process limit to 1200 to help chromium users with many tabs/bin/sh1.3.0-6.47.11.3.0-6.47.1securitypam_userdb.so/lib//lib/security/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:20963/SUSE_SLE-15_Update/69dea130de97d1ea9128b39535be9854-pam.SUSE_SLE-15_Updatecpioxz5x86_64-suse-linuxdirectoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=b1199f1fc429df8307ae5b19109b45f9566f3bff, stripped RRRRRR R RRR Rutf-8c207420de5e15e512cea4851e9a2a476f1c51302e0cc08a0cbf86bc3f2f2214c? 7zXZ !t/7?] crt:bLL#QC[H!k9nC²yb;"Z+I\4op;KfQnW#b kHpH_y|,=ЕpJ(B4Љ 9>5V% sKc#C8:^狁uS҄S%a K-?mgEQsk[juG6Xx I6+2Sbc͆wl:0jPްvL]fjYYt:W-Y&Y*b;K2:?(r397ZdfBuJDЬTu8Gֿ CB7XiM HLºITowL9H}wpRB} `xֵbXΏZSEdAp6ͺ9W%Za2`F"ըyfA2, $h(u;I^# 8{XIM qd!pߣT8cX@{{ۺM}އU-u㥌&#ѐV*͟,= [{5=S,CQy sH- HWR]Fn[ RF\eק5C8 ?+7 Rf=!c8(XxX7܎u~H>쯢11>,ׯ: $&cOnZ9F}P-`A&a}w4@ZIO>]ڌ?7%@VuݖkK]lqg-]6Ӽb2: ?DZ!_wsi[L&Z[ghX!+ m3?.BRy?pN>i \UUP‘X|`&\?P$ Q%OW_9fB,ZM':i8*dzWï؛9UsR\{vӗ&^,i#EvdՊXoWlm>ֈֲ+Lӌ2M~#;XT[P]󬦒˝p_G2T,an8c0^e\3rF;jDHi$ŏ),aIQ])mn1N1N񑋰KU :8\4#REM<A3Ty0_4U~ʾOṑĿLڬAotV£6~KT -QN1O: B0MG*ZJ֖/t9pjn} !E9ddkK5#SB]Dh4HE┉I"+eA '$ڮ-yJl~x >'l=U)_Ig\ h!"_ Aꦺ.- hxB1=㫒`ἷWX0\|X3r^7:j@CXYMq6 {PB^?~}B Sfeh $.JgMX-h{gd>|^(fIz]eYk=N$!yL~A_rMh~ɦvxQAk1_E&O^jg ܜ_'Clu6WL4~xM+bs$S5 ;3%7O|Np0D!O!N,JdM!ZW:fkg:D܃4h|Iq8ꕁqޏyee 4;;LpqN=,4HdùgKʑ1m3N`(eXdÝR%9PHsհSʕ=sc#:곢CMۨ.]\ք]NVew*|LCm'di͸Jbi@$@A3ɭf @y GGQդ)bS0Zh E/ާ *20dնn֊,!,'kH6ʽp202>uT8ۇߖKx 6DBn2,m (%O9FQI-OX^V.@`X2d _B[UCyI('9&-*Ck >2gD]Or=4l:^As9o zRn-hs\5,|"s:XD`(6p`G3&t)ق}4F;c)EU#=ٽ@Vz' ysbL+\僴֫j9hBV ɒɆO'60+SoU Z}S|5{C u&NwPISyu|_9zpc[M3?bV# 䯽'SqA/ oD]?Ȧ@=wX vH=+Agţ\_W~j>cz$5N/6N[/a[r @[> J%c#XUlGu*nvyC#R%ava~>uiafOMߢޮ:y7E5|gt/\H 29V$d*ѻ#~!e"wS3ь݁ !^4Kg}zaHF2Nnh]i+AjE+%VwUR6Z:EH=7;_\>dODž/*۪C! m/xs֋W.j!~Ǹoͺr9CIJȟg?mGopn܍3(k܌bD-D0{w}aZZ|JKDMJ|Q!)s.3 C kc>;;r/|Q&̝Mqt4NY2sCmޤs\rtTGm,.ȉZ;&P0fƎ T_f&%ɉE_00?]W$4ӌruXƲAT zr\oWG8w% $C£S9-:9Tl?~s?@E_X=S