Date: Fri, 06 Dec 2019 00:39:37 +0000 From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 242467] security/libpwquality: update to 1.4.2 (and more) Message-ID: <bug-242467-6497@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242467 Bug ID: 242467 Summary: security/libpwquality: update to 1.4.2 (and more) Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: gnome@FreeBSD.org Reporter: jkim@FreeBSD.org Assignee: gnome@FreeBSD.org Flags: maintainer-feedback?(gnome@FreeBSD.org) Created attachment 209745 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D209745&action= =3Dedit Update to 1.4.2 (and more) 1.4.2 is available for a while now. Excerpt from NEWS: - Release 1.4.2 (10/31/2019) * Fix regression in handling retry, enforce_for_root, and local_users_only options introduced with the previous release. - Release 1.4.1 (9/17/2019) * pam_pwquality: Abort the retry loop if user requests it. * Allow setting retry, enforce_for_root, and local_users_only options in the pwquality.conf config file. * Fix uninitialized memory in word distance calculations. * Fix possible one byte buffer underflow when parsing the config file. * Return default cracklib dictionary path if not overriden. * Update translations from Zanata. While I am at it, I added LICENSE stuff and OPTIONized NLS. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242467-6497>