Branches for Quantal

Name Status Last Modified Last Commit
lp:ubuntu/quantal/pam bug 2 Mature 2012-07-03 07:18:54 UTC
89. [ Nathan Williams ] Add /usr/local/ga...

Author: Steve Langasek
Revision Date: 2012-07-03 06:55:25 UTC

[ Nathan Williams ]
Add /usr/local/games to PATH. LP: #110287.

lp:~abone/ubuntu/quantal/pam/abone bug 1 Development 2012-11-12 04:09:24 UTC
90. * debian/patches-applied/parse_useren...

Author: Andrey Bondarenko
Revision Date: 2012-11-12 04:06:42 UTC

* debian/patches-applied/parse_userenv_as_envfile: user_envfile is parsed as an env
  file instead of parsing it as a conffile which has different syntax.
  see: https://fedorahosted.org/pipermail/pam-developers/2011-June/thread.html#75
* Pull changes from 1.1.3-2ubuntu2.1. Remaining changes:
  - debian/patches-applied/parse_userenv_as_envfile: user_envfile is parsed
    as an env file instead of parsing it as a conffile which has different
    syntax.
* Merge changes from 1.1.2-2ubuntu8.3 and 1.1.2-2ubuntu8.2+abone1.
* SECURITY REGRESSION:
  - debian/patches/security-dropprivs.patch: updated patch to preserve
    ABI and prevent daemons from needing to be restarted. (LP: #790538)
  - debian/patches/autoconf.patch: refreshed
* debian/patches-applied/parse_userenv_as_envfile: user_envfile is parsed
  as an env file instead of parsing it as a conffile which has different
  syntax.
* SECURITY UPDATE: multiple issues with lack of adequate privilege
  dropping
  - debian/patches/security-dropprivs.patch: introduce new privilege
    dropping code in libpam/pam_modutil_priv.c, libpam/Makefile.*,
    libpam/include/security/pam_modutil.h, libpam/libpam.map,
    modules/pam_env/pam_env.c, modules/pam_mail/pam_mail.c,
    modules/pam_xauth/pam_xauth.c.
  - CVE-2010-3430
  - CVE-2010-3431
  - CVE-2010-3435
  - CVE-2010-4706
  - CVE-2010-4707
* SECURITY UPDATE: privilege escalation via incorrect environment
  - debian/patches/CVE-2010-3853.patch: use clean environment in
    modules/pam_namespace/pam_namespace.c.
  - CVE-2010-3853
* debian/patches-applied/series: disable hurd_no_setfsuid patch, as it
  isn't needed for Ubuntu, and it needs to be rewritten to work with the
  massive privilege refactoring in the security patches.
* debian/patches-applied/update-motd: santize the environment before
  calling run-parts, LP: #610125

lp:~nathwill-deactivatedaccount-deactivatedaccount/ubuntu/quantal/pam/lp110287 bug(Has a merge proposal) 1 Development 2012-07-03 07:05:55 UTC
888. add /usr/local/games to PATH

Author: Nathan Williams
Revision Date: 2012-07-03 07:05:55 UTC

add /usr/local/games to PATH

13 of 3 results