Change log for libpam-radius-auth package in Ubuntu

122 of 22 results
Published in oracular-release
Deleted in oracular-proposed (Reason: Moved to oracular)
libpam-radius-auth (2.0.1-2) unstable; urgency=medium

  [ Michael Biebl ]
  * [c0b257b] d/libpam-radius-auth.install: Install PAM module into /usr
    (Closes: #1061847)

  [ Helmut Grohne ]
  * [fd4dad4] d/rules: FTCBFS Pass --build/--host to configure
    (Closes: #1063449)

  [ Carsten Schoenert ]
  * [caa1c5b] d/control: Bump Standards-Version to 4.7.0
    No further changes needed.

 -- Carsten Schoenert <email address hidden>  Sat, 11 May 2024 08:12:51 +0200

Available diffs

Superseded in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libpam-radius-auth (2.0.1-1) unstable; urgency=medium

  [ Debian Janitor ]
  * [ee9deb8] Set upstream metadata fields: Bug-Database, Repository.
  * [64ef8a9] Update standards version to 4.6.0, no changes needed.

  [ Carsten Schoenert ]
  * [137bfd9] New upstream version 2.0.1
  * [4655404] d/rules: Adjust target to get *.so build again
  * [d774ddf] d/pam_sshd_example: Add example from upstream project
  * [87150ed] d/copyright: Update content and year data
  * [fef93b1] d/libpam-radius-auth.examples: Ship file pam_sshd_example
  * [c4e1d63] d/control: Bump Standards-Version to 4.6.2

  [ Christoph Goehre ]
  * [471d21d] rebuild patch queue from patch-queue branch
    added patches:
    - Make.inc.in-remove-duplicate-compiler-options-in-CFLAGS-a.patch
    - src-Makefile-use-CPPFLAGS-too-while-compiling.patch
  * [426c3f8] d/rules: fixed Make.inc.in didn't need override_dh_auto_build
  * [d75fec6] d/rules: delete pam_radius_auth.so in clean target
    (Closes: #1047764)
  * [d31ced5] d/lintian-overrides: fix Lintian override for
    /etc/pam_radius_auth.conf

 -- Christoph Goehre <email address hidden>  Sat, 19 Aug 2023 16:08:42 +0200

Available diffs

Superseded in noble-release
Published in mantic-release
Published in lunar-release
Obsolete in kinetic-release
Published in jammy-release
Obsolete in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libpam-radius-auth (2.0.0-1) unstable; urgency=medium

  * [2736aa5] d/libpam-radius-auth.install: Adjust install path
    Debian is supporting the Multiarch idea, thus we need to install the
    library into /lib/$DEB_HOST_MULTIARCH/security/ so it will get found.

 -- Carsten Schoenert <email address hidden>  Thu, 18 Feb 2021 17:50:12 +0100

Available diffs

Superseded in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libpam-radius-auth (1.4.0-4) unstable; urgency=medium

  * [dd1321d] d/watch: adding a watch file
    The source for pam_radius is managed on GitHub. We can monitor easily for
    newer version with a watch file.
  * [46be465] d/gbp.conf: adding extra configuration for git-buildpackage
    Use gbp for package management, a dedicated config file helps to keep the
    effort of the additional packaging workflow low.
  * [22839a4] d/README.source: adding info about source code management
    Adding some explation how this package is maintained (by gbp).
  * [1c3580a] running wrap-and-sort to improve readability
  * [23a72b1] d/copyright: change format to DEP5
    Turning the existing copyright file into a machine readable format.
  * [c6d3838] d/control: Bump Standards-Version to 4.5.1
    No further changes needed.
  * [d11655b] d/control: move over to debhelper 13
    Update the debhelper compat modus to the current most recent version 13.
  * [f4c3434] d/libpam-radius-auth.docs: use index.html from upstream
    We don't need to maintain a index.html file within the debian/ folder,
    upstream ships a own file since a while and keep this of course up to date.
  * [65e7199] d/control: Chris and myself will maintain pam_radius
    (Closes: #833039, #951770)
  * [b80ed5c] d/u/metadata: add basic meta-information for pam_radius
  * [25d1da5] d/libpam-radius-auth.doc-base: add sequencer file
    Register the shipped index.html file with doc-base.

 -- Carsten Schoenert <email address hidden>  Fri, 29 Jan 2021 17:01:06 +0100

Available diffs

Superseded in hirsute-release
Obsolete in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libpam-radius-auth (1.4.0-3) unstable; urgency=medium

  * QA upload
  * Add patch to fix buffer overflow in password field.
    (Fixes: CVE-2015-9542) (Closes: #951396)
  * Bump Standards-Version to 4.5.0 and dh-compat to 12

 -- Utkarsh Gupta <email address hidden>  Fri, 21 Feb 2020 15:47:11 +0530
Published in precise-updates
Published in precise-security
libpam-radius-auth (1.3.17-0ubuntu3.1) precise-security; urgency=medium

   [ Marc Deslauriers ]
   * SECURITY UPDATE: DoS via stack overflow in password field
    - debian/patches/CVE-2015-9542-1.patch: use length, which has been
      limited in size in pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
      buffer in pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
      rounding length in pam_radius_auth.c.
    - debian/rules: added new patches.
    - CVE-2015-9542

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 20 Feb 2020 12:40:36 -0300
Published in bionic-updates
Published in bionic-security
libpam-radius-auth (1.3.17-0ubuntu5.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: DoS via stack overflow in password field
    - debian/patches/CVE-2015-9542-1.patch: use length, which has been
      limited in size in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
      buffer in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
      rounding length in src/pam_radius_auth.c.
    - debian/rules: added new patches.
    - CVE-2015-9542

 -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2020 07:53:50 -0500
Published in xenial-updates
Published in xenial-security
libpam-radius-auth (1.3.17-0ubuntu4.1) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS via stack overflow in password field
    - debian/patches/CVE-2015-9542-1.patch: use length, which has been
      limited in size in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
      buffer in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
      rounding length in src/pam_radius_auth.c.
    - debian/rules: added new patches.
    - CVE-2015-9542

 -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2020 07:53:50 -0500
Obsolete in eoan-updates
Obsolete in eoan-security
libpam-radius-auth (1.3.17-0ubuntu5.19.10.1) eoan-security; urgency=medium

  * SECURITY UPDATE: DoS via stack overflow in password field
    - debian/patches/CVE-2015-9542-1.patch: use length, which has been
      limited in size in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
      buffer in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
      rounding length in src/pam_radius_auth.c.
    - debian/rules: added new patches.
    - CVE-2015-9542

 -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2020 07:53:50 -0500
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libpam-radius-auth (1.4.0-2ubuntu1) focal; urgency=medium

  * SECURITY UPDATE: DoS via stack overflow in password field
    - debian/patches/CVE-2015-9542-1.patch: use length, which has been
      limited in size in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-2.patch: clear out trailing part of the
      buffer in src/pam_radius_auth.c.
    - debian/patches/CVE-2015-9542-3.patch: copy password to buffer before
      rounding length in src/pam_radius_auth.c.
    - CVE-2015-9542

 -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2020 07:45:34 -0500
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libpam-radius-auth (1.4.0-2) unstable; urgency=medium

  * QA upload.
  * Fix a regression that made libpam-radius-auth/1.4.0-1 use
    a different configuration file than intended.  This version
    restores /etc/pam_radius_auth.conf as the configuration
    file for Debian package of libpam-radius-auth.
    (Closes: #908006)
  * Use the new "debhelper-compat (= 11)" method for specifying
    debhelper compat version.

 -- Niels Thykier <email address hidden>  Wed, 05 Sep 2018 19:44:07 +0000
Superseded in focal-release
Obsolete in eoan-release
Obsolete in disco-release
Obsolete in cosmic-release
Superseded in cosmic-release
Published in bionic-release
Obsolete in artful-release
Obsolete in zesty-release
Obsolete in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
libpam-radius-auth (1.3.17-0ubuntu5) yakkety; urgency=medium

  * bump compatibility level to fix FTBFS (LP: #1627834).

 -- Nishanth Aravamudan <email address hidden>  Mon, 26 Sep 2016 11:30:29 -0700

Available diffs

Superseded in yakkety-release
Published in xenial-release
Obsolete in wily-release
Obsolete in vivid-release
Obsolete in utopic-release
Published in trusty-release
Obsolete in saucy-release
Obsolete in raring-release
Obsolete in quantal-release
libpam-radius-auth (1.3.17-0ubuntu4) quantal; urgency=low

  * Rebuild for new armel compiler default of ARMv5t.
 -- Colin Watson <email address hidden>   Fri, 05 Oct 2012 08:21:48 +0100

Available diffs

Superseded in quantal-release
Published in precise-release
Obsolete in oneiric-release
Obsolete in natty-release
Obsolete in maverick-release
Obsolete in lucid-release
libpam-radius-auth (1.3.17-0ubuntu3) lucid; urgency=low

  * rebuild rest of main for armel armv7/thumb2 optimization;
    UbuntuSpec:mobile-lucid-arm-gcc-v7-thumb2
 -- Alexander Sack <email address hidden>   Sat, 06 Mar 2010 13:36:21 +0100

Available diffs

Superseded in lucid-release
Obsolete in karmic-release
libpam-radius-auth (1.3.17-0ubuntu2) karmic; urgency=low

  * No-change rebuild to gain FORTIFY defaults.

 -- Kees Cook <email address hidden>   Sat, 09 May 2009 10:36:27 -0700

Available diffs

Superseded in karmic-release
Obsolete in jaunty-release
Obsolete in intrepid-release
Obsolete in hardy-release
Superseded in hardy-release
libpam-radius-auth (1.3.17-0ubuntu1) hardy; urgency=low

  * New upstream version.
  * debian/patches/002.CAN2005-0108.diff: Remove, applied upstream.
  * Build with -fno-strict-aliasing.
  * Bump debhelper to v5.

 -- Matthias Klose <email address hidden>   Thu, 07 Feb 2008 19:22:41 +0100
Superseded in hardy-release
Obsolete in gutsy-release
libpam-radius-auth (1.3.16-4.3) unstable; urgency=low

  * NUM with maintainers consent
  * Add German debconf translation. (Closes: #410536)

Superseded in gutsy-release
Obsolete in feisty-release
libpam-radius-auth (1.3.16-4.1) unstable; urgency=low

  * Non-maintainer upload.
  * Remove bashisms in debian/rules. (Closes: #379498)

 -- Ubuntu Archive Auto-Sync <email address hidden>   Tue,  07 Nov 2006 02:37:06 +0000
Superseded in feisty-release
Obsolete in edgy-release
Obsolete in dapper-release
Superseded in dapper-release
libpam-radius-auth (1.3.16-4) unstable; urgency=low


  * Add alternate Depends to unblock debconf-2.0 transition.
  (Closes: #332003)

  * Add Vietnamese debconf translation.
  (Closes: #312442)

  * Add Czech debconf translation.
  (Closes: #316889)

  * Add Swedish debconf translation.
  (Closes: #333145)

  * Bump standard version. No changes.

 -- Fabio M. Di Nitto <email address hidden>  Sat, 15 Oct 2005 18:13:44 +0200
Obsolete in breezy-release
Obsolete in hoary-release
libpam-radius-auth (1.3.16-3) unstable; urgency=high


  * [SECURITY] Fix Denial of service:
    - Add patch 002.CAN2005-0108.diff. (CAN2005-0108)

  * Add french debconf translation. (Closes: #268027)

  * Add dutch debconf translation. (Closes: #274897)

 -- Fabio M. Di Nitto <email address hidden>  Wed, 19 Jan 2005 10:42:18 +0100
Obsolete in warty-security
Superseded in warty-security
Superseded in warty-security
libpam-radius-auth (1.3.16-2ubuntu0.1) warty-security; urgency=low


  * SECURITY UPDATE: Apache mod_auth_radius remote integer overflow
  * pam_radius_auth.c:
    - Apache mod_auth_radius 1.5.4 allows remote malicious RADIUS servers to
    cause a denial of service (crash) via a RADIUS_REPLY_MESSAGE with a RADIUS
    attribute length of 1, which leads to a memcpy operation with a -1 length
    argument.
  * References:
    - CAN-2005-0108

 -- Gerardo Di Giacomo <email address hidden>  Mon, 24 Jan 2005 23:18:52 +0000
Obsolete in warty-release
libpam-radius-auth (1.3.16-2) warty; urgency=low


  * Acknowledge NMU. Thanks Michael for your help! (Closes: #266924)
  * Remove spurious "echo foo1" from debian/config ;)

 -- Fabio M. Di Nitto <email address hidden>  Mon, 23 Aug 2004 07:46:17 +0200
122 of 22 results