Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 06 Dec 2019 00:39:37 +0000
From:      bugzilla-noreply@freebsd.org
To:        gnome@FreeBSD.org
Subject:   [Bug 242467] security/libpwquality: update to 1.4.2 (and more)
Message-ID:  <bug-242467-6497@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242467

            Bug ID: 242467
           Summary: security/libpwquality: update to 1.4.2 (and more)
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: gnome@FreeBSD.org
          Reporter: jkim@FreeBSD.org
          Assignee: gnome@FreeBSD.org
             Flags: maintainer-feedback?(gnome@FreeBSD.org)

Created attachment 209745
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D209745&action=
=3Dedit
Update to 1.4.2 (and more)

1.4.2 is available for a while now.  Excerpt from NEWS:

- Release 1.4.2 (10/31/2019)

* Fix regression in handling retry, enforce_for_root, and
  local_users_only options introduced with the previous
  release.

- Release 1.4.1 (9/17/2019)

* pam_pwquality: Abort the retry loop if user requests it.
* Allow setting retry, enforce_for_root, and local_users_only options
  in the pwquality.conf config file.
* Fix uninitialized memory in word distance calculations.
* Fix possible one byte buffer underflow when parsing the config file.
* Return default cracklib dictionary path if not overriden.
* Update translations from Zanata.

While I am at it, I added LICENSE stuff and OPTIONized NLS.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242467-6497>