Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

pam-1.6.1-slfo.1.2.3 RPM for x86_64

From OpenSuSE Leap 16.0 for x86_64

Name: pam Distribution: SUSE Linux Framework One
Version: 1.6.1 Vendor: SUSE LLC <https://www.suse.com/>
Release: slfo.1.2.3 Build date: Wed Aug 7 16:44:56 2024
Group: System/Libraries Build host: reproducible
Size: 1650810 Source RPM: pam-1.6.1-slfo.1.2.3.src.rpm
Packager: https://www.suse.com/
Url: https://github.com/linux-pam/linux-pam
Summary: A Security Tool that Provides Authentication for Applications
PAM (Pluggable Authentication Modules) is a system security tool that
allows system administrators to set authentication policies without
having to recompile programs that do authentication.

Provides

Requires

License

GPL-2.0-or-later OR BSD-3-Clause

Changelog

* Wed Aug 07 2024 sbrabec@suse.com
  - Prevent cursor escape from the login prompt [bsc#1194818]
    * Added: pam-bsc1194818-cursor-escape.patch
* Wed Apr 10 2024 kukuk@suse.com
  - Update to version 1.6.1
    - pam_env: fixed --disable-econf --enable-vendordir support.
    - pam_unix: do not warn if password aging is disabled.
    - pam_unix: try to set uid to 0 before unix_chkpwd invocation.
    - pam_unix: allow empty passwords with non-empty hashes.
    - Multiple minor bug fixes, build fixes, portability fixes,
      documentation improvements, and translation updates.
  - Remove backports:
    - pam_env-fix_vendordir.patch
    - pam_env-fix-enable-vendordir-fallback.patch
    - pam_env-remove-escaped-newlines.patch
    - pam_unix-fix-password-aging-disabled.patch
* Thu Feb 22 2024 valentin.lefebvre@suse.com
  - Use autosetup to prepare for RPM 4.20.
* Wed Feb 07 2024 kukuk@suse.com
  - pam.tmpfiles: Make sure the content of the /run directories get
    removed in case of a soft-reboot
* Tue Jan 30 2024 kukuk@suse.com
  - Enable pam_canonicalize_user.so
* Fri Jan 19 2024 kukuk@suse.com
  - Add post 1.6.0 release fixes for pam_env and pam_unix:
    - pam_env-fix-enable-vendordir-fallback.patch
    - pam_env-fix_vendordir.patch
    - pam_env-remove-escaped-newlines.patch
    - pam_unix-fix-password-aging-disabled.patch
  - Update to version 1.6.0
    - Added support of configuration files with arbitrarily long lines.
    - build: fixed build outside of the source tree.
    - libpam: added use of getrandom(2) as a source of randomness if available.
    - libpam: fixed calculation of fail delay with very long delays.
    - libpam: fixed potential infinite recursion with includes.
    - libpam: implemented string to number conversions validation when parsing
      controls in configuration.
    - pam_access: added quiet_log option.
    - pam_access: fixed truncation of very long group names.
    - pam_canonicalize_user: new module to canonicalize user name.
    - pam_echo: fixed file handling to prevent overflows and short reads.
    - pam_env: added support of '\' character in environment variable values.
    - pam_exec: allowed expose_authtok for password PAM_TYPE.
    - pam_exec: fixed stack overflow with binary output of programs.
    - pam_faildelay: implemented parameter ranges validation.
    - pam_listfile: changed to treat \r and \n exactly the same in configuration.
    - pam_mkhomedir: hardened directory creation against timing attacks.
    - Please note that using *at functions leads to more open file handles
      during creation.
    - pam_namespace: fixed potential local DoS (CVE-2024-22365).
    - pam_nologin: fixed file handling to prevent short reads.
    - pam_pwhistory: helper binary is now built only if SELinux support is
      enabled.
    - pam_pwhistory: implemented reliable usernames handling when remembering
      passwords.
    - pam_shells: changed to allow shell entries with absolute paths only.
    - pam_succeed_if: fixed treating empty strings as numerical value 0.
    - pam_unix: added support of disabled password aging.
    - pam_unix: synchronized password aging with shadow.
    - pam_unix: implemented string to number conversions validation.
    - pam_unix: fixed truncation of very long user names.
    - pam_unix: corrected rounds retrieval for configured encryption method.
    - pam_unix: implemented reliable usernames handling when remembering
      passwords.
    - pam_unix: changed to always run the helper to obtain shadow password
      entries.
    - pam_unix: unix_update helper binary is now built only if SELinux support
      is enabled.
    - pam_unix: added audit support to unix_update helper.
    - pam_userdb: added gdbm support.
    - Multiple minor bug fixes, portability fixes, documentation improvements,
      and translation updates.
  - The following patches are obsolete with the update:
    - pam_access-doc-IPv6-link-local.patch
    - pam_access-hostname-debug.patch
    - pam_shells-fix-econf-memory-leak.patch
    - pam_shells-fix-econf-memory-leak.patch
    - disable-examples.patch
  - pam-login_defs-check.sh: adjust checksum, SHA_CRYPT_MAX_ROUNDS
    is no longer used.
* Wed Aug 23 2023 kukuk@suse.com
  - Fix building without SELinux
* Mon Aug 07 2023 kukuk@suse.com
  - pam_access backports from upstream:
    - pam_access-doc-IPv6-link-local.patch:
      Document only partial supported IPv6 link local addresses
    - pam_access-hostname-debug.patch:
      Don't print error if we cannot resolve a hostname, does not
      need to be a hostname
    - pam_shells-fix-econf-memory-leak.patch:
      Free econf keys variable
    - disable-examples.patch:
      Don't build examples
* Tue May 09 2023 kukuk@suse.com
  - Update to final 1.5.3 release:
    - configure: added --enable-logind option to use logind instead of utmp
      in pam_issue and pam_timestamp.
    - pam_modutil_getlogin: changed to use getlogin() from libc instead of
      parsing utmp.
    - Added libeconf support to pam_env and pam_shells.
    - Added vendor directory support to pam_access, pam_env, pam_group,
      pam_faillock, pam_limits, pam_namespace, pam_pwhistory, pam_sepermit,
      pam_shells, and pam_time.
    - pam_limits: changed to not fail on missing config files.
    - pam_pwhistory: added conf= option to specify config file location.
    - pam_pwhistory: added file= option to specify password history file
      location.
    - pam_shells: added shells.d support when libeconf and vendordir are enabled.
    - Deprecated pam_lastlog: this module is no longer built by default because
      it uses utmp, wtmp, btmp and lastlog, but none of them are Y2038 safe,
      even on 64bit architectures.
      pam_lastlog will be removed in one of the next releases, consider using
      pam_lastlog2 (from https://github.com/thkukuk/lastlog2) and/or
      pam_wtmpdb (from https://github.com/thkukuk/wtmpdb) instead.
    - Deprecated _pam_overwrite(), _pam_overwrite_n(), and _pam_drop_reply()
      macros provided by _pam_macros.h; the memory override performed by these
      macros can be optimized out by the compiler and therefore can no longer
      be relied upon.
* Thu Apr 20 2023 kukuk@suse.com
  - pam-extra: add split provide
* Wed Apr 12 2023 kukuk@suse.com
  - pam-userdb: add split provide
* Tue Apr 11 2023 kukuk@suse.com
  - Drop pam-xauth_ownership.patch, got fixed in sudo itself
  - Drop pam-bsc1177858-dont-free-environment-string.patch, was a
    fix for above patch
* Thu Apr 06 2023 kukuk@suse.com
  - Use bcond selinux to disable SELinux
  - Remove old pam_unix_* compat symlinks
  - Move pam_userdb to own pam-userdb sub-package
  - pam-extra contains now modules having extended dependencies like
    libsystemd
  - Update to 1.5.3.90 git snapshot
  - Drop merged patches:
    - pam-git.diff
    - docbook5.patch
    - pam_pwhistory-docu.patch
    - pam_xauth_data.3.xml.patch
  - Drop Linux-PAM-1.5.2.90.tar.xz as we have to rebuild all
    documentation anyways and don't use the prebuild versions
  - Move all devel manual pages to pam-manpages, too. Fixes the
    problem that adjusted defaults not shown correct.
* Mon Mar 20 2023 kukuk@suse.com
  - Add common-session-nonlogin and postlogin-* pam.d config files
    for https://github.com/SUSE/pam-config/pull/16, pam_lastlog2
    and upcoming pam_wtmpdb.
* Fri Mar 10 2023 giuliano.belinassi@suse.com
  - Enable livepatching support on x86_64.
* Tue Jan 24 2023 valentin.lefebvre@suse.com
  - Use rpm macros for pam dist conf dir (/usr/etc/security)
* Wed Jan 18 2023 schubi@suse.com
  - Moved following files/dirs in /etc/security to vendor directory:
    access.conf, limits.d, sepermit.conf, time.conf, namespace.conf,
    namespace.d, namespace.init
* Sat Dec 24 2022 dleuenberger@suse.com
  - Also obsolete pam_unix-32bit to have clean upgrade path.
* Fri Dec 16 2022 kukuk@suse.com
  - Merge pam_unix back into pam, seperate package not needed anymore
* Thu Dec 15 2022 kukuk@suse.com
  - Update pam-git.diff to current upstream
    - pam_env: Use vendor specific pam_env.conf and environment as fallback
    - pam_shells: Use the vendor directory
    obsoletes pam_env_econf.patch
  - Refresh docbook5.patch
* Tue Dec 06 2022 kukuk@suse.com
  - pam_pwhistory-docu.patch, docbook5.patch: convert docu to
    docbook5
* Thu Dec 01 2022 kukuk@suse.com
  - pam-git.diff: update to current git
    - obsoletes pam-hostnames-in-access_conf.patch
    - obsoletes tst-pam_env-retval.c
  - pam_env_econf.patch refresh
* Tue Nov 22 2022 kukuk@suse.com
  - Move pam_env config files below /usr/etc
* Tue Oct 11 2022 schubi@suse.com
  - pam_env: Using libeconf for reading configuration and environment
    files. (Patch: pam_env_econf.patch; Testcase: tst-pam_env-retval.c)
* Fri Jun 17 2022 kukuk@suse.com
  - Keep old directory in filelist for migration
* Wed Jun 01 2022 kukuk@suse.com
  - Move PAM config files from /usr/etc/pam.d to /usr/lib/pam.d
* Fri Mar 11 2022 kukuk@suse.com
  - pam-hostnames-in-access_conf.patch: update with upstream
    submission. Fixes several bugs including memory leaks.
* Wed Feb 09 2022 kukuk@suse.com
  - Move group.conf and faillock.conf to /usr/etc/security
* Mon Feb 07 2022 kukuk@suse.com
  - Update to current git for enhanced vendordir support (pam-git.diff)
    Obsoletes:
    - 0001-Include-pam_xauth_data.3.xml-in-source-archive-400.patch
    - 0002-Only-include-vendordir-in-manual-page-if-set-401.patch
    - 0003-Use-vendor-specific-limits.conf-as-fallback-402.patch
* Mon Dec 13 2021 kukuk@suse.com
  - Drop pam_umask-usergroups-login_defs.patch, does more harm
    than helps. If not explizit specified as module option, we
    use UMASK from login.defs unmodified.
* Thu Nov 25 2021 kukuk@suse.com
  - Don't define doc/manpages packages in main build
* Wed Nov 24 2021 kukuk@suse.com
  - Add missing recommends and split provides
* Wed Nov 24 2021 kukuk@suse.com
  - Use multibuild to build docu with correct paths and available
    features.
* Mon Nov 22 2021 kukuk@suse.com
  - common-session: move pam_systemd to first position as if the
    file would have been generated with pam-config
  - Add vendordir fixes and enhancements from upstream:
    - pam_xauth_data.3.xml.patch
    - 0001-Include-pam_xauth_data.3.xml-in-source-archive-400.patch
    - 0002-Only-include-vendordir-in-manual-page-if-set-401.patch
    - 0003-Use-vendor-specific-limits.conf-as-fallback-402.patch
  - For buggy bot: Makefile-pam_unix-nis.diff belonged to the other
    spec file.
* Wed Nov 17 2021 sbrabec@suse.com
  - Update pam-login_defs-check.sh regexp and
    login_defs-support-for-pam symbol to version 1.5.2
    (new variable HMAC_CRYPTO_ALGO).
* Tue Nov 02 2021 gmbr3@opensuse.org
  - Add /run/pam_timestamp to pam.tmpfiles
* Tue Oct 12 2021 josef.moellers@suse.com
  - Corrected macro definition of %_pam_moduledir:
    %_pam_moduledir %{_libdir}/security
    [macros.pam]
* Wed Oct 06 2021 josef.moellers@suse.com
  - Prepend a slash to the expansion of %{_lib} in macros.pam as
    this are defined without a leading slash!
* Wed Sep 15 2021 kukuk@suse.com
  - Rename motd.tmpfiles to pam.tmpfiles
    - Add /run/faillock directory
* Fri Sep 10 2021 kukuk@suse.com
  - pam-login_defs-check.sh: adjust for new login.defs variable usages
* Mon Sep 06 2021 josef.moellers@suse.com
  - Update to 1.5.2
    Noteworthy changes in Linux-PAM 1.5.2:
    * pam_exec: implemented quiet_log option.
    * pam_mkhomedir: added support of HOME_MODE and UMASK from
      /etc/login.defs.
    * pam_timestamp: changed hmac algorithm to call openssl instead
      of the bundled sha1 implementation if selected, added option
      to select the hash algorithm to use with HMAC.
    * Added pkgconfig files for provided libraries.
    * Added --with-systemdunitdir configure option to specify systemd
      unit directory.
    * Added --with-misc-conv-bufsize configure option to specify the
      buffer size in libpam_misc's misc_conv() function, raised the
      default value for this parameter from 512 to 4096.
    * Multiple minor bug fixes, portability fixes, documentation
      improvements, and translation updates.
    pam_tally2 has been removed upstream, remove pam_tally2-removal.patch
    pam_cracklib has been removed from the upstream sources. This
    obsoletes pam-pam_cracklib-add-usersubstr.patch and
    pam_cracklib-removal.patch.
    The following patches have been accepted upstream and, so,
    are obsolete:
    - pam-bsc1181443-make-nofile-unlimited-mean-nr_open.patch
    - pam_securetty-don-t-complain-about-missing-config.patch
    - bsc1184358-prevent-LOCAL-from-being-resolved.patch
    - revert-check_shadow_expiry.diff
    [Linux-PAM-1.5.2-docs.tar.xz, Linux-PAM-1.5.2-docs.tar.xz.asc,
    Linux-PAM-1.5.2.tar.xz, Linux-PAM-1.5.2.tar.xz.asc,
    pam-pam_cracklib-add-usersubstr.patch, pam_cracklib-removal.patch,
    pam-bsc1181443-make-nofile-unlimited-mean-nr_open.patch,
    pam_securetty-don-t-complain-about-missing-config.patch,
    bsc1184358-prevent-LOCAL-from-being-resolved.patch,
    revert-check_shadow_expiry.diff]
* Thu Aug 12 2021 kukuk@suse.com
  - pam_umask-usergroups-login_defs.patch: Deprecate pam_umask
    explicit "usergroups" option and instead read it from login.def's
    "USERGROUP_ENAB" option if umask is only defined there.
    [bsc#1189139]
* Tue Aug 03 2021 pgajdos@suse.com
  - package man5/motd.5 as a man-pages link to man8/pam_motd.8
    [bsc#1188724]
* Tue Jul 13 2021 kukuk@suse.com
  - revert-check_shadow_expiry.diff: revert wrong
    CRYPT_SALT_METHOD_LEGACY check.
* Fri Jun 25 2021 gmbr3@opensuse.org
  - Create /run/motd.d
* Wed Jun 09 2021 lnussel@suse.de
  - Remove legacy pre-usrmerge compat code (removed pam-usrmerge.diff)
  - Backport patch to not install /usr/etc/securetty (boo#1033626) ie
    no distro defaults and don't complain about it missing
    (pam_securetty-don-t-complain-about-missing-config.patch)
  - add debug bcond to be able to build pam with debug output easily
  - add macros file to allow other packages to stop hardcoding
    directory names. Compatible with Fedora.
* Mon May 10 2021 josef.moellers@suse.com
  - In the 32-bit compatibility package for 64-bit architectures,
    require "systemd-32bit" to be also installed as it contains
    pam_systemd.so for 32 bit applications.
    [bsc#1185562, baselibs.conf]
* Wed Apr 07 2021 josef.moellers@suse.com
  - If "LOCAL" is configured in access.conf, and a login attempt from
    a remote host is made, pam_access tries to resolve "LOCAL" as
    a hostname and logs a failure.
    Checking explicitly for "LOCAL" and rejecting access in this case
    resolves this issue.
    [bsc#1184358, bsc1184358-prevent-LOCAL-from-being-resolved.patch]
* Wed Mar 31 2021 josef.moellers@suse.com
  - pam_limits: "unlimited" is not a legitimate value for "nofile"
    (see setrlimit(2)). So, when "nofile" is set to one of the
    "unlimited" values, it is set to the contents of
    "/proc/sys/fs/nr_open" instead.
    Also changed the manpage of pam_limits to express this.
    [bsc#1181443, pam-bsc1181443-make-nofile-unlimited-mean-nr_open.patch]
* Thu Feb 18 2021 kukuk@suse.com
  - Add missing conflicts for pam_unix-nis
* Tue Feb 16 2021 kukuk@suse.com
  - Split out pam_unix module and build without NIS support
* Fri Nov 27 2020 kukuk@suse.com
  - Update to 1.5.1
    - pam_unix: fixed CVE-2020-27780 - authentication bypass when a user
      doesn't exist and root password is blank [bsc#1179166]
    - pam_faillock: added nodelay option to not set pam_fail_delay
    - pam_wheel: use pam_modutil_user_in_group to check for the group membership
      with getgrouplist where it is available
* Thu Nov 26 2020 lnussel@suse.de
  - add macros.pam to abstract directory for pam modules
* Thu Nov 19 2020 kukuk@suse.com
  - Update to 1.5.0
    - obsoletes pam-bsc1178727-initialize-daysleft.patch
    - Multiple minor bug fixes, portability fixes, and documentation improvements.
    - Extended libpam API with pam_modutil_check_user_in_passwd function.
    - pam_faillock: changed /run/faillock/$USER permissions from 0600 to 0660.
    - pam_motd: read motd files with target user credentials skipping unreadable ones.
    - pam_pwhistory: added a SELinux helper executable.
    - pam_unix, pam_usertype: implemented avoidance of certain timing attacks.
    - pam_wheel: implemented PAM_RUSER fallback for the case when getlogin fails.
    - pam_env: Reading of the user environment is deprecated and will be removed
      at some point in the future.
    - libpam: pam_modutil_drop_priv() now correctly sets the target user's
      supplementary groups, allowing pam_motd to filter messages accordingly
  - Refresh pam-xauth_ownership.patch
  - pam_tally2-removal.patch: Re-add pam_tally2 for deprecated sub-package
  - pam_cracklib-removal.patch: Re-add pam_cracklib for deprecated sub-package
* Wed Nov 18 2020 josef.moellers@suse.com
  - pam_cracklib: added code to check whether the password contains
    a substring of of the user's name of at least <N> characters length
    in some form.
    This is enabled by the new parameter "usersubstr=<N>"
    See https://github.com/libpwquality/libpwquality/commit/bfef79dbe6aa525e9557bf4b0a61e6dde12749c4
    [jsc#SLE-16719, jsc#SLE-16720, pam-pam_cracklib-add-usersubstr.patch]
* Wed Nov 18 2020 josef.moellers@suse.com
  - pam_xauth.c: do not free() a string which has been (successfully)
    passed to putenv().
    [bsc#1177858, pam-bsc1177858-dont-free-environment-string.patch]
* Fri Nov 13 2020 josef.moellers@suse.com
  - Initialize pam_unix pam_sm_acct_mgmt() local variable "daysleft"
    to avoid spurious (and misleading)
      Warning: your password will expire in ... days.
    fixed upstream with commit db6b293046a
    [bsc#1178727, pam-bsc1178727-initialize-daysleft.patch]
* Tue Nov 10 2020 kukuk@suse.com
  - Enable pam_faillock [bnc#1171562]
* Thu Oct 29 2020 lnussel@suse.de
  - prepare usrmerge (boo#1029961, pam-usrmerge.diff)
* Thu Oct 08 2020 josef.moellers@suse.com
  - /usr/bin/xauth chokes on the old user's $HOME being on an NFS
    file system. Run /usr/bin/xauth using the old user's uid/gid
    Patch courtesy of Dr. Werner Fink.
    [bsc#1174593, pam-xauth_ownership.patch]
* Thu Oct 08 2020 sbrabec@suse.com
  - pam-login_defs-check.sh: Fix the regexp to get a real variable
    list (boo#1164274).
* Wed Jun 24 2020 josef.moellers@suse.com
  - Revert the previous change [SR#815713].
    The group is not necessary for PAM functionality but used only
    during testing. The test system should therefore create this group.
    [bsc#1171016, pam.spec]
* Mon Jun 15 2020 josef.moellers@suse.com
  - Add requirement for group "wheel" to spec file.
    [bsc#1171016, pam.spec]
* Mon Jun 08 2020 kukuk@suse.com
  - Update to final 1.4.0 release
    - includes pam-check-user-home-dir.patch
    - obsoletes fix-man-links.dif
* Mon Jun 08 2020 kukuk@suse.com
  - common-password: remove pam_cracklib, as that is deprecated.
* Thu May 28 2020 josef.moellers@suse.com
  - pam_setquota.so:
    When setting quota, don't apply any quota if the user's $HOME is
    a mountpoint (ie the user has a partition of his/her own).
    [bsc#1171721, pam-check-user-home-dir.patch]
* Wed May 27 2020 kukuk@suse.com
  - Update to current Linux-PAM snapshot
    - pam_tally* and pam_cracklib got deprecated
  - Disable pam_faillock and pam_setquota until they are whitelisted
* Tue May 12 2020 josef.moellers@suse.com
  - Adapted patch pam-hostnames-in-access_conf.patch for new version
    New version obsoleted patch use-correct-IP-address.patch
    [pam-hostnames-in-access_conf.patch,
    use-correct-IP-address.patch]
* Tue May 12 2020 kukuk@suse.com
  - Update to current Linux-PAM snapshot
    - Obsoletes pam_namespace-systemd.diff
* Tue May 12 2020 kukuk@suse.com
  - Update to current Linux-PAM snapshot
    - Add pam_faillock
    - Multiple minor bug fixes and documentation improvements
    - Fixed grammar of messages printed via pam_prompt
    - Added support for a vendor directory and libeconf
    - configure: Allowed disabling documentation through --disable-doc
    - pam_get_authtok_verify: Avoid duplicate password verification
    - pam_env: Changed the default to not read the user .pam_environment file
    - pam_group, pam_time: Fixed logical error with multiple ! operators
    - pam_keyinit: In pam_sm_setcred do the same as in pam_sm_open_session
    - pam_lastlog: Do not log info about failed login if the session was opened
      with PAM_SILENT flag
    - pam_lastlog: Limit lastlog file use by LASTLOG_UID_MAX option in login.defs
    - pam_lastlog: With 'unlimited' option prevent SIGXFSZ due to reduced 'fsize'
      limit
    - pam_motd: Export MOTD_SHOWN=pam after showing MOTD
    - pam_motd: Support multiple motd paths specified, with filename overrides
    - pam_namespace: Added a systemd service, which creates the namespaced
      instance parent directories during boot
    - pam_namespace: Support for noexec, nosuid and nodev flags for tmpfs mounts
    - pam_shells: Recognize /bin/sh as the default shell
    - pam_succeed_if: Support lists in group membership checks
    - pam_tty_audit: If kernel audit is disabled return PAM_IGNORE
    - pam_umask: Added new 'nousergroups' module argument and allowed specifying
      the default for usergroups at build-time
    - pam_unix: Added 'nullresetok' option to allow resetting blank passwords
    - pam_unix: Report unusable hashes found by checksalt to syslog
    - pam_unix: Support for (gost-)yescrypt hashing methods
    - pam_unix: Use bcrypt b-variant when it bcrypt is chosen
    - pam_usertype: New module to tell if uid is in login.defs ranges
    - Added new API call pam_start_confdir() for special applications that
      cannot use the system-default PAM configuration paths and need to
      explicitly specify another path
  - pam_namespace-systemd.diff: fix path of pam_namespace.services
* Thu Apr 02 2020 lnussel@suse.de
  - own /usr/lib/motd.d/ so other packages can add files there
* Tue Mar 24 2020 josef.moellers@suse.com
  - Listed all manual pages seperately as pam_userdb.8 has been moved
    to pam-extra.
    Also %exclude %{_defaultdocdir}/pam as the docs are in a separate
    package.
    [pam.spec]
* Mon Mar 16 2020 josef.moellers@suse.com
  - pam_userdb moved to a new package pam-extra as pam-modules
    is obsolete and not part of SLE.
    [bsc#1166510, pam.spec]
* Thu Mar 12 2020 josef.moellers@suse.com
  - Removed pam_userdb from this package and moved to pam-modules.
    This removed the requirement for libdb.
    Also made "xz" required for all releases.
    Remove limits for nproc from /etc/security/limits.conf
    [bsc#1164562, bsc#1166510, bsc#1110700, pam.spec]
* Wed Feb 19 2020 kukuk@suse.de
  - Recommend login.defs only (no hard requirement)
* Tue Sep 24 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190923.ea78d67:
    * Fixed missing quotes in configure script
    * Add support for a vendor directory and libeconf (#136)
    * pam_lastlog: document the 'unlimited' option
    * pam_lastlog: prevent crash due to reduced 'fsize' limit
    * pam_unix_sess.c add uid for opening session
    * Fix the man page for "pam_fail_delay()"
    * Fix a typo
    * Update a function comment
  - drop usr-etc-support.patch (accepted upstream)
* Thu Sep 05 2019 kukuk@suse.de
  - Add migration support from /etc to /usr/etc during upgrade
* Wed Sep 04 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190902.9de67ee:
    * pwhistory: fix read of uninitialized data and memory leak when modifying opasswd
* Tue Aug 27 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190826.1b087ed:
    * libpam/pam_modutil_sanitize.c: optimize the way to close fds
* Thu Aug 22 2019 jengelh@inai.de
  - Replace old $RPM_* shell vars by macros.
  - Avoid unnecessary invocation of subshells.
  - Shorten recipe for constructing securetty contents on s390.
* Mon Aug 19 2019 kukuk@suse.de
  - usr-etc-support.patch: Add support for /usr/etc/pam.d
* Mon Aug 19 2019 kukuk@suse.de
  - encryption_method_nis.diff: obsolete, NIS clients shouldn't
    require DES anymore.
  - etc.environment: removed, the sources contain the same
* Mon Aug 19 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190807.e31dd6c:
    * pam_tty_audit: Manual page clarification about password logging
    * pam_get_authtok_verify: Avoid duplicate password verification
    * Mention that ./autogen.sh is needeed to be run if you check out the sources from git
    * pam_unix: Correct MAXPASS define name in the previous two commits.
    * Restrict password length when changing password
    * Trim password at PAM_MAX_RESP_SIZE chars
    * pam_succeed_if: Request user data only when needed
    * pam_tally2: Remove unnecessary fsync()
    * Fixed a grammer mistake
    * Fix documentation for pam_wheel
    * Fix a typo in the documentation
    * pam_lastlog: Improve silent option documentation
    * pam_lastlog: Respect PAM_SILENT flag
    * Fix regressions from the last commits.
    * Replace strndupa with strncpy
    * build: ignore pam_lastlog when logwtmp is not available.
    * build: ignore pam_rhosts if neither ruserok nor ruserok_af is available.
    * pam_motd: Cleanup the code and avoid unnecessary logging
    * pam_lastlog: Limit lastlog file use by LASTLOG_UID_MAX option in login.defs.
    * Move the duplicated search_key function to pam_modutil.
    * pam_unix: Use pam_syslog instead of helper_log_err.
    * pam_unix: Report unusable hashes found by checksalt to syslog.
    * Revert "pam_unix: Add crypt_default method, if supported."
    * pam_unix: Add crypt_default method, if supported.
    * Revert part of the commit 4da9febc
    * pam_unix: Add support for (gost-)yescrypt hashing methods.
    * pam_unix: Fix closing curly brace. (#77)
    * pam_unix: Add support for crypt_checksalt, if libcrypt supports it.
    * pam_unix: Prefer a gensalt function, that supports auto entropy.
    * pam_motd: Fix segmentation fault when no motd_dir specified (#76)
    * pam_motd: Support multiple motd paths specified, with filename overrides (#69)
    * pam_unix: Use bcrypt b-variant for computing new hashes.
    * pam_tally, pam_tally2: fix grammar and spelling (#54)
    * Fix grammar of messages printed via pam_prompt
    * pam_stress: do not mark messages for translation
    * pam_unix: remove obsolete _UNIX_AUTHTOK, _UNIX_OLD_AUTHTOK, and _UNIX_NEW_AUTHTOK macros
    * pam_unix: remove obsolete _unix_read_password prototype
* Thu May 02 2019 sbrabec@suse.com
  - Add virtual symbols for login.defs compatibility (bsc#1121197).
  - Add login.defs safety check pam-login_defs-check.sh
    (bsc#1121197).
* Thu Nov 15 2018 josef.moellers@suse.com
  - When comparing an incoming IP address with an entry in
    access.conf that only specified a single host (ie no netmask),
    the incoming IP address was used rather than the IP address from
    access.conf, effectively comparing the incoming address with
    itself.  (Also fixed a small typo while I was at it)
    {bsc#1115640, use-correct-IP-address.patch, CVE-2018-17953]
* Mon Oct 22 2018 josef.moellers@suse.com
  - Upgrade to 1.3.1
    * pam_motd: add support for a motd.d directory
    * pam_umask: Fix documentation to align with order of loading umask
    * pam_get_user.3: Fix missing word in documentation
    * pam_tally2 --reset: avoid creating a missing tallylog file
    * pam_mkhomedir: Allow creating parent of homedir under /
    * access.conf.5: Add note about spaces around ':'
    * pam.8: Workaround formatting problem
    * pam_unix: Check return value of malloc used for setcred data
    * pam_cracklib: Drop unused prompt macros
    * pam_tty_audit: Support matching users by uid range
    * pam_access: support parsing files in /etc/security/access.d/*.conf
    * pam_localuser: Correct documentation
    * pam_issue: Fix no prompting in parse escape codes mode
    * Unification and cleanup of syslog log levels
    Also: removed nproc limit, referred to systemd instead.
    Patch5 (pam-fix-config-order-in-manpage.patch) not needed any more.
    [bsc#1112508, pam-fix-config-order-in-manpage.patch]
* Fri Aug 24 2018 psimons@suse.com
  - Add libdb as build-time dependency to enable pam_userdb module.
    This module is useful for implementing virtual user support for
    vsftpd and possibly other daemons, too. [bsc#929711, fate#322538]
* Fri Jul 13 2018 sbrabec@suse.com
  - Install empty directory /etc/security/namespace.d for
    pam_namespace.so iscript.
* Thu May 03 2018 josef.moellers@suse.com
  - pam_umask.8 needed to be patched as well.
    [bsc#1089884, pam-fix-config-order-in-manpage.patch]
* Wed May 02 2018 josef.moellers@suse.com
  - Changed order of configuration files to reflect actual code.
    [bsc#1089884, pam-fix-config-order-in-manpage.patch]
* Thu Feb 22 2018 fvogt@suse.com
  - Use %license (boo#1082318)
* Thu Oct 12 2017 schwab@suse.de
  - Prerequire group(shadow), user(root)
* Fri Jan 27 2017 josef.moellers@suse.com
  - Allow symbolic hostnames in access.conf file.
    [pam-hostnames-in-access_conf.patch, boo#1019866]
* Thu Dec 08 2016 josef.moellers@suse.com
  - Increased nproc limits for non-privileged users to 4069/16384.
    Removed limits for "root".
    [pam-limit-nproc.patch, bsc#1012494, bsc#1013706]
* Sun Jul 31 2016 develop7@develop7.info
  - pam-limit-nproc.patch: increased process limit to help
    Chrome/Chromuim users with really lots of tabs. New limit gets
    closer to UserTasksMax parameter in logind.conf
* Thu Jul 28 2016 kukuk@suse.de
  - Add doc directory to filelist.
* Mon May 02 2016 kukuk@suse.de
  - Remove obsolete README.pam_tally [bsc#977973]
* Thu Apr 28 2016 kukuk@suse.de
  - Update Linux-PAM to version 1.3.0
  - Rediff encryption_method_nis.diff
  - Link pam_unix against libtirpc and external libnsl to enable
    IPv6 support.
* Thu Apr 14 2016 kukuk@suse.de
  - Add /sbin/unix2_chkpwd (moved from pam-modules)
* Mon Apr 11 2016 kukuk@suse.de
  - Remove (since accepted upstream):
    - 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch
    - 0002-Remove-enable-static-modules-option-and-support-from.patch
    - 0003-fix-nis-checks.patch
    - 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch
    - 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch
* Fri Apr 01 2016 kukuk@suse.de
  - Add 0005-Use-TI-RPC-functions-if-we-compile-and-link-against-.patch
    - Replace IPv4 only functions
* Fri Apr 01 2016 kukuk@suse.de
  - Fix typo in common-account.pamd [bnc#959439]
* Tue Mar 29 2016 kukuk@suse.de
  - Add 0004-PAM_EXTERN-isn-t-needed-anymore-but-don-t-remove-it-.patch
    - readd PAM_EXTERN for external PAM modules
* Wed Mar 23 2016 kukuk@suse.de
  - Add 0001-Remove-YP-dependencies-from-pam_access-they-were-nev.patch
  - Add 0002-Remove-enable-static-modules-option-and-support-from.patch
  - Add 0003-fix-nis-checks.patch
* Sat Jul 25 2015 joschibrauchle@gmx.de
  - Add folder /etc/security/limits.d as mentioned in 'man pam_limits'
* Fri Jun 26 2015 kukuk@suse.de
  - Update to version 1.2.1
    - security update for CVE-2015-3238
* Mon Apr 27 2015 kukuk@suse.de
  - Update to version 1.2.0
    - obsoletes Linux-PAM-git-20150109.diff
* Fri Jan 09 2015 kukuk@suse.de
  - Re-add lost patch encryption_method_nis.diff [bnc#906660]
* Fri Jan 09 2015 kukuk@suse.de
  - Update to current git:
    - Linux-PAM-git-20150109.diff replaces Linux-PAM-git-20140127.diff
    - obsoletes pam_loginuid-log_write_errors.diff
    - obsoletes pam_xauth-sigpipe.diff
    - obsoletes bug-870433_pam_timestamp-fix-directory-traversal.patch
* Fri Jan 09 2015 bwiedemann@suse.com
  - increase process limit to 1200 to help chromium users with many tabs
* Tue May 06 2014 bwiedemann@suse.com
  - limit number of processes to 700 to harden against fork-bombs
    Add pam-limit-nproc.patch
* Wed Apr 09 2014 ckornacker@suse.com
  - Fix CVE-2014-2583: pam_timestamp path injection (bnc#870433)
    bug-870433_pam_timestamp-fix-directory-traversal.patch
* Tue Apr 01 2014 ckornacker@suse.com
  - adding sclp_line0/ttysclp0 to /etc/securetty on s390 (bnc#869664)
* Mon Jan 27 2014 kukuk@suse.de
  - Add pam_loginuid-log_write_errors.diff: log significant loginuid
    write errors
  - pam_xauth-sigpipe.diff: avoid potential SIGPIPE when writing to
    xauth process
* Mon Jan 27 2014 kukuk@suse.de
  - Update to current git (Linux-PAM-git-20140127.diff), which
    obsoletes pam_loginuid-part1.diff, pam_loginuid-part2.diff and
    Linux-PAM-git-20140109.diff.
    - Fix gratuitous use of strdup and x_strdup
    - pam_xauth: log fatal errors preventing xauth process execution
    - pam_loginuid: cleanup loginuid buffer initialization
    - libpam_misc: fix an inconsistency in handling memory allocation errors
    - pam_limits: fix utmp->ut_user handling
    - pam_mkhomedir: check and create home directory for the same user
    - pam_limits: detect and ignore stale utmp entries
  - Disable pam_userdb (remove db-devel from build requires)
* Fri Jan 10 2014 kukuk@suse.com
  - Add pam_loginuid-part1.diff: Ignore missing /proc/self/loginuid
  - Add pam_loginuid-part2.diff: Workaround to run pam_loginuid inside lxc
* Thu Jan 09 2014 kukuk@suse.de
  - Update to current git (Linux-PAM-git-20140109.diff, which
    replaces pam_unix.diff and encryption_method_nis.diff)
    - pam_access: fix debug level logging
    - pam_warn: log flags passed to the module
    - pam_securetty: check return value of fgets
    - pam_lastlog: fix format string
    - pam_loginuid: If the correct loginuid is already set, skip writing it
* Fri Nov 29 2013 schwab@linux-m68k.org
  - common-session.pamd: add missing newline
* Thu Nov 28 2013 kukuk@suse.de
  - Remove libtrpc support to solve dependency/build cycles, plain
    glibc is enough for now.
* Tue Nov 12 2013 kukuk@suse.de
  - Add encryption_method_nis.diff:
    - implement pam_unix2 functionality to use another hash for
      NIS passwords.
* Fri Nov 08 2013 kukuk@suse.de
  - Add pam_unix.diff:
    - fix if /etc/login.defs uses DES
    - ask always for old password if a NIS password will be changed
* Sat Sep 28 2013 mc@suse.com
  - fix manpages links (bnc#842872) [fix-man-links.dif]
* Fri Sep 20 2013 hrvoje.senjan@gmail.com
  - Explicitly add pam_systemd.so to list of modules in
    common-session.pamd (bnc#812462)
* Fri Sep 20 2013 kukuk@suse.de
  - Update to official release 1.1.8 (1.1.7 + git-20130916.diff)
  - Remove needless pam_tally-deprecated.diff patch
* Mon Sep 16 2013 kukuk@suse.de
  - Replace fix-compiler-warnings.diff with current git snapshot
    (git-20130916.diff) for pam_unix.so:
    - fix glibc warnings
    - fix syntax error in SELinux code
    - fix crash at login
* Thu Sep 12 2013 kukuk@suse.de
  - Remove pam_unix-login.defs.diff, not needed anymore
* Thu Sep 12 2013 kukuk@suse.de
  - Update to version 1.1.7 (bugfix release)
    - Drop missing-DESTDIR.diff and pam-fix-includes.patch
    - fix-compiler-warnings.diff: fix unchecked setuid return code
* Tue Aug 06 2013 mc@suse.de
  - adding hvc0-hvc7 to /etc/securetty on s390 (bnc#718516)
* Mon May 27 2013 kukuk@suse.de
  - Fix typo in common-password [bnc#821526]
* Fri Apr 26 2013 mmeister@suse.com
  - Added libtool as BuildRequire, and autoreconf -i option to fix
    build with new automake
* Tue Feb 05 2013 kukuk@suse.de
  - Update pam_unix-login.defs.diff patch to the final upstream
    version.
* Tue Feb 05 2013 kukuk@suse.de
  - Adjust URL
  - Add set_permission macro and PreReq
  - Read default encryption method from /etc/login.defs
    (pam_unix-login.defs.diff)
* Fri Jan 25 2013 kukuk@suse.com
  - Remove deprecated pam_tally.so module, it's too buggy and can
    destroy config and log files.
* Mon Nov 12 2012 kukuk@suse.de
  - Sync common-*.pamd config with pam-config (use pam_unix.so as
    default).
* Wed Sep 19 2012 kukuk@suse.de
  - Fix building in Factory (add patch missing-DESTDIR.diff)
* Fri Sep 14 2012 kukuk@suse.de
  - Update to Linux-PAM 1.1.6
    - Update translations
    - pam_cracklib: Add more checks for weak passwords
    - pam_lastlog: Never lock out root
    - Lot of bug fixes and smaller enhancements
* Thu Jun 21 2012 aj@suse.de
  - Include correct headers for getrlimit (add patch pam-fix-includes.patch).
* Mon Apr 23 2012 jengelh@medozas.de
  - Update homepage URL in specfile
* Sat Mar 03 2012 jengelh@medozas.de
  - Update to new upstream release 1.1.5
    * pam_env: Fix CVE-2011-3148: correctly count leading whitespace
    when parsing environment file in pam_env
    * Fix CVE-2011-3149: when overflowing, exit with PAM_BUF_ERR in
    pam_env
    * pam_access: Add hostname resolution cache
* Tue Oct 25 2011 mc@suse.de
  - pam_tally2: remove invalid options from manpage (bnc#726071)
  - fix possible overflow and DOS in pam_env (bnc#724480)
    CVE-2011-3148, CVE-2011-3149
* Mon Jun 27 2011 kukuk@suse.de
  - Update to version 1.1.4
    * pam_securetty: Honour console= kernel option, add noconsole option
    * pam_limits: Add %group syntax, drop change_uid option, add set_all option
    * Lot of small bug fixes
    * Add support for libtirpc
  - Build against libtirpc
* Thu May 26 2011 cfarrell@novell.com
  - license update: GPL-2.0+ or BSD-3-Clause
    Updating to spdx.org/licenses syntax as legal-auto for some reason did
    not accept the previous spec file license
* Wed May 25 2011 kukuk@suse.de
  - Remove libxcrypt-devel from BuildRequires
* Wed Feb 23 2011 vcizek@novell.com
  - bnc#673826 rework
    * manpage is left intact, as it was
    * correct parsing of "quiet" option
* Wed Feb 23 2011 vcizek@novell.com
  - fix for bnc#673826 (pam_listfile)
    * removed unnecessary logging when listfile is missing and quiet
    option is specified
    * manpage is also updated, to reflect that all option
    require values
* Thu Oct 28 2010 kukuk@suse.de
  - Update to Linux-PAM 1.1.3
    - fixes CVE-2010-3853, CVE-2010-3431, CVE-2010-3430
    - pam_unix: Add minlen option, change default from 6 to 0
* Tue Aug 31 2010 kukuk@suse.de
  - Update to Linux-PAM 1.1.2
* Mon Jun 28 2010 jengelh@medozas.de
  - use %_smp_mflags
* Mon May 10 2010 kukuk@suse.de
  - Update to current CVS version (pam_rootok: Add support for
    chauthtok and acct_mgmt, [bnc#533249])
* Thu Mar 11 2010 kukuk@suse.de
  - Install correct documentation
* Wed Dec 16 2009 kukuk@suse.de
  - Update to Linux-PAM 1.1.1 (bug fix release)
* Sat Dec 12 2009 jengelh@medozas.de
  - add baselibs.conf as a source
* Wed Dec 09 2009 jengelh@medozas.de
  - enable parallel building
* Fri Jun 26 2009 kukuk@suse.de
  - Add fixes from CVS
* Wed Jun 24 2009 kukuk@suse.de
  - Update to final version 1.1.0 (spelling fixes)
* Tue May 05 2009 kukuk@suse.de
  - Update to version 1.0.92:
    * Update translations
    * pam_succeed_if: Use provided username
    * pam_mkhomedir: Fix handling of options
* Fri Apr 03 2009 rguenther@suse.de
  - Remove cracklib-dict-full and pwdutils BuildRequires again.
* Fri Mar 27 2009 kukuk@suse.de
  - Update to version 1.0.91 aka 1.1 Beta2:
    * Changes in the behavior of the password stack. Results of
      PRELIM_CHECK are not used for the final run.
    * Redefine LOCAL keyword of pam_access configuration file
    * Add support for try_first_pass and use_first_pass to
      pam_cracklib
    * New password quality tests in pam_cracklib
    * Add support for passing PAM_AUTHTOK to stdin of helpers from
      pam_exec
    * New options for pam_lastlog to show last failed login attempt and
      to disable lastlog update
    * New pam_pwhistory module to store last used passwords
    * New pam_tally2 module similar to pam_tally with wordsize independent
      tally data format, obsoletes pam_tally
    * Make libpam not log missing module if its type is prepended with '-'
    * New pam_timestamp module for authentication based on recent successful
      login.
    * Add blowfish support to pam_unix.
    * Add support for user specific environment file to pam_env.
    * Add pam_get_authtok to libpam as Linux-PAM extension.
* Wed Feb 11 2009 ro@suse.de
  - use sr@latin instead of sr@Latn
* Thu Feb 05 2009 kukuk@suse.de
  - Log failures of setrlimit in pam_limits [bnc#448314]
  - Fix using of requisite in password stack [bnc#470337]
* Tue Jan 20 2009 kukuk@suse.de
  - Regenerate documentation [bnc#448314]
* Wed Dec 10 2008 olh@suse.de
  - use Obsoletes: -XXbit only for ppc64 to help solver during distupgrade
    (bnc#437293)
* Thu Dec 04 2008 olh@suse.de
  - obsolete old -XXbit packages (bnc#437293)
* Thu Nov 27 2008 mc@suse.de
  - enhance the man page for limits.conf (bnc#448314)
* Mon Nov 24 2008 kukuk@suse.de
  - pam_time: fix parsing if '|' is used [bdo#326407]
* Wed Nov 19 2008 kukuk@suse.de
  - pam_xauth: update last patch
  - pam_pwhistory: add missing type option
* Tue Nov 04 2008 mc@suse.de
  - pam_xauth: put XAUTHLOCALHOSTNAME into new enviroment
    (bnc#441314)
* Fri Oct 17 2008 kukuk@suse.de
  - Add pam_tally2
  - Regenerate Documentation
* Sat Oct 11 2008 kukuk@suse.de
  - Enhance pam_lastlog with status output
  - Add pam_pwhistory as tech preview
* Fri Sep 26 2008 kukuk@suse.de
  - pam_tally: fix fd leak
  - pam_mail: fix "quiet" option
* Fri Aug 29 2008 kukuk@suse.de
  - Update to version 1.0.2 (fix SELinux regression)
  - enhance pam_tally [FATE#303753]
  - Backport fixes from CVS
* Wed Aug 20 2008 prusnak@suse.cz
  - enabled SELinux support [Fate#303662]
* Wed Apr 16 2008 kukuk@suse.de
  - Update to version 1.0.1:
    - Fixes regression in pam_set_item().
* Thu Apr 10 2008 ro@suse.de
  - added baselibs.conf file to build xxbit packages
    for multilib support
* Fri Apr 04 2008 kukuk@suse.de
  - Remove devfs lines from securetty [bnc#372241]
* Thu Apr 03 2008 kukuk@suse.de
  - Update to version 1.0.0:
    - Official first "stable" release
    - bug fixes
    - translation updates
* Fri Feb 15 2008 kukuk@suse.de
  - Update to version 0.99.10.0:
    - New substack directive in config file syntax
    - New module pam_tty_audit.so for enabling and disabling tty
      auditing
    - New PAM items PAM_XDISPLAY and PAM_XAUTHDATA
    - Improved functionality of pam_namespace.so module (method flags,
      namespace.d configuration directory, new options).
    - Finaly removed deprecated pam_rhosts_auth module.
* Wed Oct 10 2007 kukuk@suse.de
  - Update to version 0.99.9.0:
    - misc_conv no longer blocks SIGINT; applications that don't want
      user-interruptable prompts should block SIGINT themselves
    - Merge fixes from Debian
    - Fix parser for pam_group and pam_time
* Wed Jul 18 2007 kukuk@suse.de
  - Update to version 0.99.8.1:
    - Fix regression in pam_audit
* Fri Jul 06 2007 kukuk@suse.de
  - Update to version 0.99.8.0:
    - Add translations for ar, ca, da, ru, sv and zu.
    - Update hungarian translation.
    - Add support for limits.d directory to pam_limits.
    - Add minclass option to pam_cracklib
    - Add new group syntax to pam_access
* Thu Apr 19 2007 mc@suse.de
  - move the documentation into a seperate package (pam-doc)
    [partly fixes Bug #265733]
* Mon Mar 26 2007 rguenther@suse.de
  - add flex and bison BuildRequires
* Wed Jan 24 2007 mc@suse.de
  - add %verify_permissions for /sbin/unix_chkpwd
    [#237625]
* Tue Jan 23 2007 kukuk@suse.de
  - Update to Version 0.99.7.1 (security fix)
* Wed Jan 17 2007 kukuk@suse.de
  - Update to Version 0.99.7.0
    * Add manual page for pam_unix.so.
    * Add pam_faildelay module to set pam_fail_delay() value.
    * Fix possible seg.fault in libpam/pam_set_data().
    * Cleanup of configure options.
    * Update hungarian translation, fix german translation.
* Wed Jan 17 2007 lnussel@suse.de
  - install unix_chkpwd setuid root instead of setgid shadow (#216816)
* Tue Oct 24 2006 kukuk@suse.de
  - pam_unix.so/unix_chkpwd: teach about blowfish [#213929]
  - pam_namespace.so: Fix two possible buffer overflow
  - link against libxcrypt
* Sat Oct 07 2006 kukuk@suse.de
  - Update hungarian translation [#210091]
* Tue Sep 19 2006 kukuk@suse.de
  - Don't remove pam_unix.so
  - Use cracklib again (goes lost with one of the last cleanups)
* Thu Sep 14 2006 kukuk@suse.de
  - Add pam_umask.so to common-session [Fate#3621]
* Wed Sep 06 2006 kukuk@suse.de
  - Update to Linux-PAM 0.99.6.3 (merges all patches)
* Wed Aug 30 2006 kukuk@suse.de
  - Update to Linux-PAM 0.99.6.2 (incorporate last change)
  - Add pam_loginuid and fixes from CVS [Fate#300486]
* Wed Aug 23 2006 kukuk@suse.de
  - Fix seg.fault in pam_cracklib if retyped password is empty
* Tue Aug 22 2006 kukuk@suse.de
  - Remove use_first_pass from pam_unix2.so in password section
* Fri Aug 11 2006 kukuk@suse.de
  - Update to Linux-PAM 0.99.6.1 (big documentation update)
* Fri Jul 28 2006 kukuk@suse.de
  - Add missing namespace.init script
* Thu Jul 27 2006 kukuk@suse.de
  - Reenable audit subsystem [Fate#300486]
* Wed Jun 28 2006 kukuk@suse.de
  - Update to Linux-PAM 0.99.5.0 (more manual pages, three new PAM
    modules: pam_keyinit, pam_namespace, pam_rhosts)
* Mon Jun 12 2006 kukuk@suse.de
  - Update to current CVS (lot of new manual pages and docu)
* Tue May 30 2006 kukuk@suse.de
  - Update to Linux-PAM 0.99.4.0 (merge all patches and translations)
* Wed May 24 2006 kukuk@suse.de
  - Fix problems found by Coverity
* Wed May 17 2006 schwab@suse.de
  - Don't strip binaries.
* Fri May 05 2006 kukuk@suse.de
  - Fix pam_tally LFS support [#172492]
* Fri Apr 21 2006 kukuk@suse.de
  - Update fr.po and pl.po
* Tue Apr 11 2006 kukuk@suse.de
  - Update km.po
* Tue Apr 04 2006 kukuk@suse.de
  - Remove obsolete pam-laus from the system
* Mon Mar 27 2006 kukuk@suse.de
  - Update translations for pt, pl, fr, fi and cs
  - Add translation for uk
* Tue Mar 21 2006 kukuk@suse.de
  - Update hu.po
* Tue Mar 21 2006 kukuk@suse.de
  - Add translation for tr
* Mon Mar 13 2006 kukuk@suse.de
  - Fix order of NULL checks in pam_get_user
  - Fix comment in pam_lastlog for translators to be visible in
    pot file
  - Docu update, remove pam_selinux docu
* Thu Mar 02 2006 kukuk@suse.de
  - Update km translation
* Thu Feb 23 2006 kukuk@suse.de
  - pam_lastlog:
    - Initialize correct struct member [SF#1427401]
    - Mark strftime fmt string for translation [SF#1428269]
* Sun Feb 19 2006 kukuk@suse.de
  - Update more manual pages
* Sat Feb 18 2006 ro@suse.de
  - really disable audit if header file not present
* Tue Feb 14 2006 kukuk@suse.de
  - Update fi.po
  - Add km.po
  - Update pl.po
* Mon Feb 13 2006 kukuk@suse.de
  - Update with better manual pages
* Thu Feb 09 2006 kukuk@suse.de
  - Add translation for nl, update pt translation
* Fri Jan 27 2006 kukuk@suse.de
  - Move devel manual pages to -devel package
  - Mark PAM config files as noreplace
  - Mark /etc/securetty as noreplace
  - Run ldconfig
  - Fix libdb/ndbm compat detection with gdbm
  - Adjust german translation
  - Add all services to pam_listfile
* Wed Jan 25 2006 mls@suse.de
  - converted neededforbuild to BuildRequires
* Fri Jan 13 2006 kukuk@suse.de
  - Update to Linux-PAM 0.99.3.0 release candiate tar balls
    (new translations)
* Mon Jan 09 2006 kukuk@suse.de
  - Fix NULL handling for LSB-pam test suite [#141240]
* Sun Jan 08 2006 kukuk@suse.de
  - Fix usage of PAM_AUTHTOK_RECOVER_ERR vs. PAM_AUTHTOK_RECOVERY_ERR
* Fri Jan 06 2006 kukuk@suse.de
  - NULL is allowed as thirs argument for pam_get_item [#141240]
* Wed Dec 21 2005 kukuk@suse.de
  - Add fixes from CVS
* Thu Dec 15 2005 kukuk@suse.de
  - Fix pam_lastlog: don't report error on first login
* Tue Dec 13 2005 kukuk@suse.de
  - Update to 0.99.2.1
* Fri Dec 09 2005 kukuk@suse.de
  - Add /etc/environment to avoid warnings in syslog
* Mon Dec 05 2005 kukuk@suse.de
  - disable SELinux
* Wed Nov 23 2005 kukuk@suse.de
  - Update getlogin() fix to final one
* Mon Nov 21 2005 kukuk@suse.de
  - Fix PAM getlogin() implementation
* Mon Nov 21 2005 kukuk@suse.de
  - Update to official 0.99.2.0 release
* Tue Nov 08 2005 kukuk@suse.de
  - Update to new snapshot
* Mon Oct 10 2005 kukuk@suse.de
  - Enable original pam_wheel module
* Tue Sep 27 2005 kukuk@suse.de
  - Update to current CVS
  - Compile libpam_misc with -fno-strict-aliasing
* Mon Sep 19 2005 kukuk@suse.de
  - Update to current CVS
  - Fix compiling of pammodutil with -fPIC
* Sun Sep 18 2005 kukuk@suse.de
  - Update to current CVS
* Tue Aug 23 2005 kukuk@suse.de
  - Update to new snapshot (Major version is back to 0)
* Fri Aug 19 2005 kukuk@suse.de
  - Update to Linux-PAM 0.99.0.3 snapshot
* Mon Jul 11 2005 kukuk@suse.de
  - Add pam_umask
* Mon Jul 04 2005 kukuk@suse.de
  - Update to current CVS snapshot
* Thu Jun 23 2005 kukuk@suse.de
  - Update to current CVS snapshot
  - Add pam_loginuid
* Thu Jun 09 2005 kukuk@suse.de
  - Update to current CVS snapshot
* Mon Jun 06 2005 kukuk@suse.de
  - Don't reset priority [#81690]
  - Fix creating of symlinks
* Fri May 20 2005 kukuk@suse.de
  - Update to current CVS snapshot
  - Real fix for [#82687] (don't include kernel header files)
* Thu May 12 2005 schubi@suse.de
  - Bug 82687 - pam_client.h redefines __u8 and __u32
* Fri Apr 29 2005 kukuk@suse.de
  - Apply lot of fixes from CVS (including SELinux support)
* Fri Apr 01 2005 kukuk@suse.de
  - Update to final 0.79 release
* Mon Mar 14 2005 kukuk@suse.de
  - Apply patch for pam_xauth to preserve DISPLAY variable [#66885]
* Mon Jan 24 2005 kukuk@suse.de
  - Compile with large file support
* Mon Jan 24 2005 schubi@suse.de
  - Made patch of latest CVS tree
  - Removed patch pam_handler.diff ( included in CVS now )
  - moved Linux-PAM-0.78.dif to pam_group_time.diff
* Wed Jan 05 2005 kukuk@suse.de
  - Fix seg.fault, if a PAM config line is incomplete
* Thu Nov 18 2004 kukuk@suse.de
  - Update to final 0.78
* Mon Nov 08 2004 kukuk@suse.de
  - Add pam_env.so to common-auth
  - Add pam_limit.so to common-session
* Wed Oct 13 2004 kukuk@suse.de
  - Update to 0.78-Beta1
* Wed Sep 22 2004 kukuk@suse.de
  - Create pam.d/common-{auth,account,password,session} and include
    them in pam.d/other
  - Update to current CVS version of upcoming 0.78 release
* Mon Aug 23 2004 kukuk@suse.de
  - Update "code cleanup" patch
  - Disable reading of /etc/environment in pam_env.so per default
* Thu Aug 19 2004 kukuk@suse.de
  - Reenable a "fixed" version of "code cleanup" patch
  - Use pam_wheel from pam-modules package
* Wed Aug 18 2004 kukuk@suse.de
  - Disable "code cleanup" patch (no more comments about security
    fixes)
* Fri Aug 13 2004 kukuk@suse.de
  - Apply big "code cleanup" patch [Bug #39673]
* Fri Mar 12 2004 kukuk@suse.de
  - pam_wheel: Use original getlogin again, PAM internal does not
    work without application help [Bug #35682]
* Sun Jan 18 2004 meissner@suse.de
  - We no longer have pam in the buildsystem, so we
    need some buildroot magic flags for the dlopen tests.
* Thu Jan 15 2004 kukuk@suse.de
  - Cleanup neededforbuild
* Fri Dec 05 2003 kukuk@suse.de
  - Add manual pages from SLES8
* Fri Nov 28 2003 kukuk@suse.de
  - Fix installing manual pages of modules
  - Remove pthread check (db is now linked against pthread)
* Thu Nov 27 2003 kukuk@suse.de
  - Merge with current CVS
  - Apply bug fixes from bugtracking system
  - Build as normal user
* Fri Nov 21 2003 kukuk@suse.de
  - Compile with noexecstack
* Thu Nov 06 2003 kukuk@suse.de
  - Fix pam_securetty CVS patch
* Wed Oct 29 2003 kukuk@suse.de
  - Sync with current CVS version
* Thu Oct 02 2003 kukuk@suse.de
  - Add patch to implement "include" statement in pamd files
* Wed Sep 10 2003 uli@suse.de
  - added ttyS1 (VT220) to securetty on s390* (bug #29239)
* Mon Jul 28 2003 kukuk@suse.de
  - Apply lot of fixes for various problems
* Tue Jun 10 2003 kukuk@suse.de
  - Fix getlogin handling in pam_wheel.so
* Tue May 27 2003 ro@suse.de
  - added cracklib-devel to neededforbuild
* Thu Feb 13 2003 kukuk@suse.de
  - Update pam_localuser and pam_xauth.
* Wed Nov 13 2002 kukuk@suse.de
  - Update to Linux-PAM 0.77 (minor bug fixes and enhancemants)
* Mon Nov 11 2002 ro@suse.de
  - changed neededforbuild <sp> to <opensp>
* Sat Sep 14 2002 ro@suse.de
  - changed securetty / use extra file
* Fri Sep 13 2002 bk@suse.de
  - 390: standard console (4,64)/ttyS0 ->only ttyS0 in /etc/securetty
* Tue Aug 27 2002 kukuk@suse.de
  - Call password checking helper from pam_unix.so whenever the
    passwd field is invalid.
* Sat Aug 24 2002 kukuk@suse.de
  - Don't build ps and pdf documentation
* Fri Aug 09 2002 kukuk@suse.de
  - pam-devel requires pam [Bug #17543]
* Wed Jul 17 2002 kukuk@suse.de
  - Remove explicit requires
* Wed Jul 10 2002 kukuk@suse.de
  - Update to Linux-PAM 0.76
  - Remove reentrant patch for original PAM modules (needs to be
    rewritten for new PAM version)
  - Add docu in PDF format
* Thu Jul 04 2002 kukuk@suse.de
  - Fix build on different partitions
* Tue Apr 16 2002 mmj@suse.de
  - Fix to not own /usr/shar/man/man3
* Wed Mar 13 2002 kukuk@suse.de
  - Add /usr/include/security to pam-devel filelist
* Mon Feb 11 2002 ro@suse.de
  - tar option for bz2 is "j"
* Fri Jan 25 2002 kukuk@suse.de
  - Fix last pam_securetty patch
* Thu Jan 24 2002 kukuk@suse.de
  - Use reentrant getpwnam functions for most modules
  - Fix unresolved symbols in pam_access and pam_userdb
* Sun Jan 20 2002 kukuk@suse.de
  - libpam_misc: Don't handle Ctrl-D as error.
* Wed Jan 16 2002 kukuk@suse.de
  - Remove SuSEconfig.pam
  - Update pam_localuser and pam_xauth
  - Add new READMEs about blowfish and cracklib
* Mon Nov 12 2001 kukuk@suse.de
  - Remove pam_unix.so (is part of pam-modules)
* Fri Nov 09 2001 kukuk@suse.de
  - Move extra PAM modules to separate package
  - Require pam-modules package
* Fri Aug 24 2001 kukuk@suse.de
  - Move susehelp config file to susehelp package
* Mon Aug 13 2001 ro@suse.de
  - changed neededforbuild <sp_libs> to <sp-devel>
* Tue Aug 07 2001 kukuk@suse.de
  - Fixes wrong symlink handling of pam_homecheck [Bug #3905]
* Wed Jul 11 2001 kukuk@suse.de
  - Sync pam_homecheck and pam_unix2 fixes from 7.2
  - Always ask for the old password if it is expired
* Sat May 05 2001 kukuk@suse.de
  - Cleanup Patches, make tar archive from extra pam modules
* Fri May 04 2001 kukuk@suse.de
  - Use LOG_NOTICE for trace option [Bug #7673]
* Thu Apr 12 2001 kukuk@suse.de
  - Linux-PAM: link pam_access against libnsl
  - Add pam.conf for susehelp/pam html docu
* Tue Apr 10 2001 kukuk@suse.de
  - Linux-PAM: Update to version 0.75
* Tue Apr 03 2001 kukuk@suse.de
  - Linux-PAM: link libpam_misc against libpam [Bug #6890]
* Thu Mar 08 2001 kukuk@suse.de
  - Linux-PAM: Fix manual pages (.so reference)
  - pam_pwcheck: fix Makefile
* Tue Mar 06 2001 kukuk@suse.de
  - Update for Linux-PAM 0.74
  - Drop pwdb subpackage
* Tue Feb 13 2001 kukuk@suse.de
  - pam_unix2: Create temp files with permission 0600
* Tue Feb 06 2001 ro@suse.de
  - pam_issue.c: include time.h to make it compile
* Fri Jan 05 2001 kukuk@suse.de
  - Don't print error message about failed initialization from
    pam_limits with kernel 2.2 [Bug #5198]
* Thu Jan 04 2001 kukuk@suse.de
  - Adjust docu for pam_limits
* Sun Dec 17 2000 kukuk@suse.de
  - Adjust docu for pam_pwcheck
* Thu Dec 07 2000 kukuk@suse.de
  - Add fix for pam_limits from 0.73
* Thu Oct 26 2000 kukuk@suse.de
  - Add db-devel to need for build
* Fri Oct 20 2000 kukuk@suse.de
  - Don't link PAM modules against old libpam library
* Wed Oct 18 2000 kukuk@suse.de
  - Create new "devel" subpackage
* Thu Oct 12 2000 kukuk@suse.de
  - Add SuSEconfig.pam
* Tue Oct 03 2000 kukuk@suse.de
  - Fix problems with new gcc and glibc 2.2 header files
* Wed Sep 13 2000 kukuk@suse.de
  - Fix problem with passwords longer then PASS_MAX_LEN
* Wed Sep 06 2000 kukuk@suse.de
  - Add missing PAM modules to filelist
  - Fix seg.fault in pam_pwcheck [BUG #3894]
  - Clean spec file
* Fri Jun 23 2000 kukuk@suse.de
  - Lot of bug fixes in pam_unix2 and pam_pwcheck
  - compress postscript docu
* Mon May 15 2000 kukuk@suse.de
  - Move docu to /usr/share/doc/pam
  - Fix some bugs in pam_unix2 and pam_pwcheck
* Tue Apr 25 2000 kukuk@suse.de
  - Add pam_homecheck Module
* Tue Apr 25 2000 kukuk@suse.de
  - Add devfs devices to /etc/securetty
* Wed Mar 01 2000 kukuk@suse.de
  - Fix handling of changing passwords to empty one
* Tue Feb 22 2000 kukuk@suse.de
  - Set correct attr for unix_chkpwd and pwdb_chkpwd
* Tue Feb 15 2000 kukuk@suse.de
  - Update pam_pwcheck
  - Update pam_unix2
* Mon Feb 07 2000 kukuk@suse.de
  - pwdb: Update to 0.61
* Thu Jan 27 2000 kukuk@suse.de
  - Add config files and README for md5 passwords
  - Update pam_pwcheck
  - Update pam_unix2
* Thu Jan 13 2000 kukuk@suse.de
  - Update pam_unix2
  - New: pam_pwcheck
  - Update to Linux-PAM 0.72
* Wed Oct 13 1999 kukuk@suse.de
  - pam_pwdb: Add security fixes from RedHat
* Mon Oct 11 1999 kukuk@suse.de
  - Update to Linux-PAM 0.70
  - Update to pwdb-0.60
  - Fix more pam_unix2 shadow bugs
* Fri Oct 08 1999 kukuk@suse.de
  - Add more PAM fixes
  - Implement Password changing request (sp_lstchg == 0)
* Mon Sep 13 1999 bs@suse.de
  - ran old prepare_spec on spec file to switch to new prepare_spec.
* Sat Sep 11 1999 kukuk@suse.de
  - Add pam_wheel to file list
  - pam_wheel: Minor fixes
  - pam_unix2: root is allowed to change passwords with wrong
      password aging information
* Mon Aug 30 1999 kukuk@suse.de
  - pam_unix2: Fix typo
* Thu Aug 19 1999 kukuk@suse.de
  - Linux-PAM: Update to version 0.69
* Fri Jul 16 1999 kukuk@suse.de
  - pam_unix2: Root is allowed to use the old password again.
* Tue Jul 13 1999 kukuk@suse.de
  - pam_unix2: Allow root to set an empty password.
* Sat Jul 10 1999 kukuk@suse.de
  - Add HP-UX password aging to pam_unix2.
* Wed Jul 07 1999 kukuk@suse.de
  - Don't install .cvsignore files
  - Make sure, /etc/shadow has the correct rights
* Tue Jul 06 1999 kukuk@suse.de
  - Update to Linux-PAM 0.68
* Wed Jun 30 1999 kukuk@suse.de
  - pam_unix2: more bug fixes
* Tue Jun 29 1999 kukuk@suse.de
  - pam_unix2: Fix "inactive" password
* Mon Jun 28 1999 kukuk@suse.de
  - pam_warn: Add missing functions
  - other.pamd: Update
  - Add more doku
* Thu Jun 24 1999 kukuk@suse.de
  - Add securetty config file
  - Fix Debian pam_env patch
* Mon Jun 21 1999 kukuk@suse.de
  - Update to Linux-PAM 0.67
  - Add Debian pam_env patch
* Thu Jun 17 1999 kukuk@suse.de
  - pam_ftp malloc (core dump) fix
* Tue Jun 15 1999 kukuk@suse.de
  - pam_unix2 fixes
* Mon Jun 07 1999 kukuk@suse.de
  - First PAM package: pam 0.66, pwdb 0.57 and pam_unix2

Files

/etc/pam.d
/etc/security
/usr/etc/environment
/usr/etc/pam.d
/usr/etc/security
/usr/etc/security/access.conf
/usr/etc/security/faillock.conf
/usr/etc/security/group.conf
/usr/etc/security/limits.conf
/usr/etc/security/limits.d
/usr/etc/security/namespace.conf
/usr/etc/security/namespace.d
/usr/etc/security/namespace.init
/usr/etc/security/pam_env.conf
/usr/etc/security/pwhistory.conf
/usr/etc/security/sepermit.conf
/usr/etc/security/time.conf
/usr/lib/motd.d
/usr/lib/pam.d
/usr/lib/pam.d/common-account
/usr/lib/pam.d/common-auth
/usr/lib/pam.d/common-password
/usr/lib/pam.d/common-session
/usr/lib/pam.d/common-session-nonlogin
/usr/lib/pam.d/other
/usr/lib/pam.d/postlogin-account
/usr/lib/pam.d/postlogin-auth
/usr/lib/pam.d/postlogin-password
/usr/lib/pam.d/postlogin-session
/usr/lib/systemd/system/pam_namespace.service
/usr/lib/tmpfiles.d/pam.conf
/usr/lib64/libpam.so.0
/usr/lib64/libpam.so.0.85.1
/usr/lib64/libpam_misc.so.0
/usr/lib64/libpam_misc.so.0.82.1
/usr/lib64/libpamc.so.0
/usr/lib64/libpamc.so.0.82.1
/usr/lib64/security
/usr/lib64/security/pam_access.so
/usr/lib64/security/pam_canonicalize_user.so
/usr/lib64/security/pam_debug.so
/usr/lib64/security/pam_deny.so
/usr/lib64/security/pam_echo.so
/usr/lib64/security/pam_env.so
/usr/lib64/security/pam_exec.so
/usr/lib64/security/pam_faildelay.so
/usr/lib64/security/pam_faillock.so
/usr/lib64/security/pam_filter
/usr/lib64/security/pam_filter.so
/usr/lib64/security/pam_filter/upperLOWER
/usr/lib64/security/pam_ftp.so
/usr/lib64/security/pam_group.so
/usr/lib64/security/pam_keyinit.so
/usr/lib64/security/pam_limits.so
/usr/lib64/security/pam_listfile.so
/usr/lib64/security/pam_localuser.so
/usr/lib64/security/pam_loginuid.so
/usr/lib64/security/pam_mail.so
/usr/lib64/security/pam_mkhomedir.so
/usr/lib64/security/pam_motd.so
/usr/lib64/security/pam_namespace.so
/usr/lib64/security/pam_nologin.so
/usr/lib64/security/pam_permit.so
/usr/lib64/security/pam_pwhistory.so
/usr/lib64/security/pam_rhosts.so
/usr/lib64/security/pam_rootok.so
/usr/lib64/security/pam_securetty.so
/usr/lib64/security/pam_selinux.so
/usr/lib64/security/pam_sepermit.so
/usr/lib64/security/pam_setquota.so
/usr/lib64/security/pam_shells.so
/usr/lib64/security/pam_stress.so
/usr/lib64/security/pam_succeed_if.so
/usr/lib64/security/pam_time.so
/usr/lib64/security/pam_tty_audit.so
/usr/lib64/security/pam_umask.so
/usr/lib64/security/pam_unix.so
/usr/lib64/security/pam_usertype.so
/usr/lib64/security/pam_warn.so
/usr/lib64/security/pam_wheel.so
/usr/lib64/security/pam_xauth.so
/usr/sbin/faillock
/usr/sbin/mkhomedir_helper
/usr/sbin/pam_namespace_helper
/usr/sbin/pwhistory_helper
/usr/sbin/unix2_chkpwd
/usr/sbin/unix_chkpwd
/usr/sbin/unix_update
/usr/share/doc/packages/pam
/usr/share/doc/packages/pam/NEWS
/usr/share/licenses/pam
/usr/share/licenses/pam/COPYING
/usr/share/locale/af/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ar/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/as/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/az/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/be/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/bg/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/bn/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/bn_IN/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/bs/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ca/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/cs/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/cy/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/da/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/de/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/de_CH/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/el/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/eo/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/es/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/et/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/eu/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/fa/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/fi/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/fr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ga/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/gl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/gu/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/he/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/hi/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/hr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/hu/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ia/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/id/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/is/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/it/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ja/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ka/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/kk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/km/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/kn/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ko/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/lt/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/lv/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/mk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ml/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/mr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ms/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/nb/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ne/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/nl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/nn/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/or/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pa/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pt/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pt_BR/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ro/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ru/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/si/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sq/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sr@latin/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sv/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ta/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/te/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/th/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/tr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/uk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/vi/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/zh_CN/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/zh_HK/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/zh_TW/LC_MESSAGES/Linux-PAM.mo


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 12 00:02:43 2024