Change log for libpam-radius-auth package in Ubuntu
1 → 22 of 22 results | First • Previous • Next • Last |
libpam-radius-auth (2.0.1-2) unstable; urgency=medium [ Michael Biebl ] * [c0b257b] d/libpam-radius-auth.install: Install PAM module into /usr (Closes: #1061847) [ Helmut Grohne ] * [fd4dad4] d/rules: FTCBFS Pass --build/--host to configure (Closes: #1063449) [ Carsten Schoenert ] * [caa1c5b] d/control: Bump Standards-Version to 4.7.0 No further changes needed. -- Carsten Schoenert <email address hidden> Sat, 11 May 2024 08:12:51 +0200
Available diffs
- diff from 2.0.1-1 to 2.0.1-2 (1.0 KiB)
Superseded in oracular-release |
Published in noble-release |
Deleted in noble-proposed (Reason: Moved to noble) |
libpam-radius-auth (2.0.1-1) unstable; urgency=medium [ Debian Janitor ] * [ee9deb8] Set upstream metadata fields: Bug-Database, Repository. * [64ef8a9] Update standards version to 4.6.0, no changes needed. [ Carsten Schoenert ] * [137bfd9] New upstream version 2.0.1 * [4655404] d/rules: Adjust target to get *.so build again * [d774ddf] d/pam_sshd_example: Add example from upstream project * [87150ed] d/copyright: Update content and year data * [fef93b1] d/libpam-radius-auth.examples: Ship file pam_sshd_example * [c4e1d63] d/control: Bump Standards-Version to 4.6.2 [ Christoph Goehre ] * [471d21d] rebuild patch queue from patch-queue branch added patches: - Make.inc.in-remove-duplicate-compiler-options-in-CFLAGS-a.patch - src-Makefile-use-CPPFLAGS-too-while-compiling.patch * [426c3f8] d/rules: fixed Make.inc.in didn't need override_dh_auto_build * [d75fec6] d/rules: delete pam_radius_auth.so in clean target (Closes: #1047764) * [d31ced5] d/lintian-overrides: fix Lintian override for /etc/pam_radius_auth.conf -- Christoph Goehre <email address hidden> Sat, 19 Aug 2023 16:08:42 +0200
Available diffs
- diff from 2.0.0-1 to 2.0.1-1 (64.9 KiB)
Superseded in noble-release |
Published in mantic-release |
Published in lunar-release |
Obsolete in kinetic-release |
Published in jammy-release |
Obsolete in impish-release |
Obsolete in hirsute-release |
Deleted in hirsute-proposed (Reason: moved to Release) |
libpam-radius-auth (2.0.0-1) unstable; urgency=medium * [2736aa5] d/libpam-radius-auth.install: Adjust install path Debian is supporting the Multiarch idea, thus we need to install the library into /lib/$DEB_HOST_MULTIARCH/security/ so it will get found. -- Carsten Schoenert <email address hidden> Thu, 18 Feb 2021 17:50:12 +0100
Available diffs
- diff from 1.4.0-4 to 2.0.0-1 (19.7 KiB)
libpam-radius-auth (1.4.0-4) unstable; urgency=medium * [dd1321d] d/watch: adding a watch file The source for pam_radius is managed on GitHub. We can monitor easily for newer version with a watch file. * [46be465] d/gbp.conf: adding extra configuration for git-buildpackage Use gbp for package management, a dedicated config file helps to keep the effort of the additional packaging workflow low. * [22839a4] d/README.source: adding info about source code management Adding some explation how this package is maintained (by gbp). * [1c3580a] running wrap-and-sort to improve readability * [23a72b1] d/copyright: change format to DEP5 Turning the existing copyright file into a machine readable format. * [c6d3838] d/control: Bump Standards-Version to 4.5.1 No further changes needed. * [d11655b] d/control: move over to debhelper 13 Update the debhelper compat modus to the current most recent version 13. * [f4c3434] d/libpam-radius-auth.docs: use index.html from upstream We don't need to maintain a index.html file within the debian/ folder, upstream ships a own file since a while and keep this of course up to date. * [65e7199] d/control: Chris and myself will maintain pam_radius (Closes: #833039, #951770) * [b80ed5c] d/u/metadata: add basic meta-information for pam_radius * [25d1da5] d/libpam-radius-auth.doc-base: add sequencer file Register the shipped index.html file with doc-base. -- Carsten Schoenert <email address hidden> Fri, 29 Jan 2021 17:01:06 +0100
Available diffs
- diff from 1.4.0-3 to 1.4.0-4 (4.8 KiB)
Superseded in hirsute-release |
Obsolete in groovy-release |
Published in focal-release |
Deleted in focal-proposed (Reason: moved to Release) |
libpam-radius-auth (1.4.0-3) unstable; urgency=medium * QA upload * Add patch to fix buffer overflow in password field. (Fixes: CVE-2015-9542) (Closes: #951396) * Bump Standards-Version to 4.5.0 and dh-compat to 12 -- Utkarsh Gupta <email address hidden> Fri, 21 Feb 2020 15:47:11 +0530
Available diffs
libpam-radius-auth (1.3.17-0ubuntu3.1) precise-security; urgency=medium [ Marc Deslauriers ] * SECURITY UPDATE: DoS via stack overflow in password field - debian/patches/CVE-2015-9542-1.patch: use length, which has been limited in size in pam_radius_auth.c. - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the buffer in pam_radius_auth.c. - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before rounding length in pam_radius_auth.c. - debian/rules: added new patches. - CVE-2015-9542 -- <email address hidden> (Leonidas S. Barbosa) Thu, 20 Feb 2020 12:40:36 -0300
Available diffs
libpam-radius-auth (1.3.17-0ubuntu5.18.04.1) bionic-security; urgency=medium * SECURITY UPDATE: DoS via stack overflow in password field - debian/patches/CVE-2015-9542-1.patch: use length, which has been limited in size in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the buffer in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before rounding length in src/pam_radius_auth.c. - debian/rules: added new patches. - CVE-2015-9542 -- Marc Deslauriers <email address hidden> Wed, 19 Feb 2020 07:53:50 -0500
Available diffs
libpam-radius-auth (1.3.17-0ubuntu4.1) xenial-security; urgency=medium * SECURITY UPDATE: DoS via stack overflow in password field - debian/patches/CVE-2015-9542-1.patch: use length, which has been limited in size in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the buffer in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before rounding length in src/pam_radius_auth.c. - debian/rules: added new patches. - CVE-2015-9542 -- Marc Deslauriers <email address hidden> Wed, 19 Feb 2020 07:53:50 -0500
Available diffs
libpam-radius-auth (1.3.17-0ubuntu5.19.10.1) eoan-security; urgency=medium * SECURITY UPDATE: DoS via stack overflow in password field - debian/patches/CVE-2015-9542-1.patch: use length, which has been limited in size in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the buffer in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before rounding length in src/pam_radius_auth.c. - debian/rules: added new patches. - CVE-2015-9542 -- Marc Deslauriers <email address hidden> Wed, 19 Feb 2020 07:53:50 -0500
Available diffs
libpam-radius-auth (1.4.0-2ubuntu1) focal; urgency=medium * SECURITY UPDATE: DoS via stack overflow in password field - debian/patches/CVE-2015-9542-1.patch: use length, which has been limited in size in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the buffer in src/pam_radius_auth.c. - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before rounding length in src/pam_radius_auth.c. - CVE-2015-9542 -- Marc Deslauriers <email address hidden> Wed, 19 Feb 2020 07:45:34 -0500
Available diffs
libpam-radius-auth (1.4.0-2) unstable; urgency=medium * QA upload. * Fix a regression that made libpam-radius-auth/1.4.0-1 use a different configuration file than intended. This version restores /etc/pam_radius_auth.conf as the configuration file for Debian package of libpam-radius-auth. (Closes: #908006) * Use the new "debhelper-compat (= 11)" method for specifying debhelper compat version. -- Niels Thykier <email address hidden> Wed, 05 Sep 2018 19:44:07 +0000
Available diffs
- diff from 1.3.17-0ubuntu5 (in Ubuntu) to 1.4.0-2 (196.6 KiB)
Superseded in focal-release |
Obsolete in eoan-release |
Obsolete in disco-release |
Obsolete in cosmic-release |
Superseded in cosmic-release |
Published in bionic-release |
Obsolete in artful-release |
Obsolete in zesty-release |
Obsolete in yakkety-release |
Deleted in yakkety-proposed (Reason: moved to release) |
libpam-radius-auth (1.3.17-0ubuntu5) yakkety; urgency=medium * bump compatibility level to fix FTBFS (LP: #1627834). -- Nishanth Aravamudan <email address hidden> Mon, 26 Sep 2016 11:30:29 -0700
Available diffs
- diff from 1.3.17-0ubuntu4 to 1.3.17-0ubuntu5 (389 bytes)
Superseded in yakkety-release |
Published in xenial-release |
Obsolete in wily-release |
Obsolete in vivid-release |
Obsolete in utopic-release |
Published in trusty-release |
Obsolete in saucy-release |
Obsolete in raring-release |
Obsolete in quantal-release |
libpam-radius-auth (1.3.17-0ubuntu4) quantal; urgency=low * Rebuild for new armel compiler default of ARMv5t. -- Colin Watson <email address hidden> Fri, 05 Oct 2012 08:21:48 +0100
Available diffs
- diff from 1.3.17-0ubuntu3 to 1.3.17-0ubuntu4 (352 bytes)
Superseded in quantal-release |
Published in precise-release |
Obsolete in oneiric-release |
Obsolete in natty-release |
Obsolete in maverick-release |
Obsolete in lucid-release |
libpam-radius-auth (1.3.17-0ubuntu3) lucid; urgency=low * rebuild rest of main for armel armv7/thumb2 optimization; UbuntuSpec:mobile-lucid-arm-gcc-v7-thumb2 -- Alexander Sack <email address hidden> Sat, 06 Mar 2010 13:36:21 +0100
Available diffs
- diff from 1.3.17-0ubuntu2 to 1.3.17-0ubuntu3 (376 bytes)
libpam-radius-auth (1.3.17-0ubuntu2) karmic; urgency=low * No-change rebuild to gain FORTIFY defaults. -- Kees Cook <email address hidden> Sat, 09 May 2009 10:36:27 -0700
Available diffs
- diff from 1.3.17-0ubuntu1 to 1.3.17-0ubuntu2 (487 bytes)
Superseded in karmic-release |
Obsolete in jaunty-release |
Obsolete in intrepid-release |
Obsolete in hardy-release |
Superseded in hardy-release |
libpam-radius-auth (1.3.17-0ubuntu1) hardy; urgency=low * New upstream version. * debian/patches/002.CAN2005-0108.diff: Remove, applied upstream. * Build with -fno-strict-aliasing. * Bump debhelper to v5. -- Matthias Klose <email address hidden> Thu, 07 Feb 2008 19:22:41 +0100
libpam-radius-auth (1.3.16-4.3) unstable; urgency=low * NUM with maintainers consent * Add German debconf translation. (Closes: #410536)
libpam-radius-auth (1.3.16-4.1) unstable; urgency=low * Non-maintainer upload. * Remove bashisms in debian/rules. (Closes: #379498) -- Ubuntu Archive Auto-Sync <email address hidden> Tue, 07 Nov 2006 02:37:06 +0000
Superseded in feisty-release |
Obsolete in edgy-release |
Obsolete in dapper-release |
Superseded in dapper-release |
libpam-radius-auth (1.3.16-4) unstable; urgency=low * Add alternate Depends to unblock debconf-2.0 transition. (Closes: #332003) * Add Vietnamese debconf translation. (Closes: #312442) * Add Czech debconf translation. (Closes: #316889) * Add Swedish debconf translation. (Closes: #333145) * Bump standard version. No changes. -- Fabio M. Di Nitto <email address hidden> Sat, 15 Oct 2005 18:13:44 +0200
libpam-radius-auth (1.3.16-3) unstable; urgency=high * [SECURITY] Fix Denial of service: - Add patch 002.CAN2005-0108.diff. (CAN2005-0108) * Add french debconf translation. (Closes: #268027) * Add dutch debconf translation. (Closes: #274897) -- Fabio M. Di Nitto <email address hidden> Wed, 19 Jan 2005 10:42:18 +0100
libpam-radius-auth (1.3.16-2ubuntu0.1) warty-security; urgency=low * SECURITY UPDATE: Apache mod_auth_radius remote integer overflow * pam_radius_auth.c: - Apache mod_auth_radius 1.5.4 allows remote malicious RADIUS servers to cause a denial of service (crash) via a RADIUS_REPLY_MESSAGE with a RADIUS attribute length of 1, which leads to a memcpy operation with a -1 length argument. * References: - CAN-2005-0108 -- Gerardo Di Giacomo <email address hidden> Mon, 24 Jan 2005 23:18:52 +0000
libpam-radius-auth (1.3.16-2) warty; urgency=low * Acknowledge NMU. Thanks Michael for your help! (Closes: #266924) * Remove spurious "echo foo1" from debian/config ;) -- Fabio M. Di Nitto <email address hidden> Mon, 23 Aug 2004 07:46:17 +0200
1 → 22 of 22 results | First • Previous • Next • Last |