#
cbea7aca |
| 06-Jul-2024 |
Dominik Hassler <hadfl@omnios.org> |
15657 struct pam_message in conversation function should be const Reviewed by: Andy Fiddaman <illumos@fiddaman.net> Reviewed by: Toomas Soome <tsoome@me.com> Reviewed by: Robert Mustacchi <rm@fingolf
15657 struct pam_message in conversation function should be const Reviewed by: Andy Fiddaman <illumos@fiddaman.net> Reviewed by: Toomas Soome <tsoome@me.com> Reviewed by: Robert Mustacchi <rm@fingolfin.org> Approved by: Gordon Ross <gordon.w.ross@gmail.com>
show more ...
|
#
bbf21555 |
| 26-Feb-2022 |
Richard Lowe <richlowe@richlowe.net> |
14443 resection manual pages per IPD4 Reviewed by: Toomas Soome <tsoome@me.com> Reviewed by: Robert Mustacchi <rm@fingolfin.org> Reviewed by: Peter Tribble <peter.tribble@gmail.com> Reviewed by: Andy
14443 resection manual pages per IPD4 Reviewed by: Toomas Soome <tsoome@me.com> Reviewed by: Robert Mustacchi <rm@fingolfin.org> Reviewed by: Peter Tribble <peter.tribble@gmail.com> Reviewed by: Andy Fiddaman <andy@omnios.org> Approved by: Dan McDonald <danmcd@joyent.com>
show more ...
|
#
134a1f4e |
| 28-Apr-2010 |
Casper H.S. Dik <Casper.Dik@Sun.COM> |
PSARC 2009/377 In-kernel pfexec implementation. PSARC 2009/378 Basic File Privileges PSARC 2010/072 RBAC update: user attrs from profiles 4912090 pfzsh(1) should exist 4912093 pfbash(1) should exist
PSARC 2009/377 In-kernel pfexec implementation. PSARC 2009/378 Basic File Privileges PSARC 2010/072 RBAC update: user attrs from profiles 4912090 pfzsh(1) should exist 4912093 pfbash(1) should exist 4912096 pftcsh(1) should exist 6440298 Expand the basic privilege set in order to restrict file access 6859862 Move pfexec into the kernel 6919171 cred_t sidesteps kmem_debug; we need to be able to detect bad hold/free when they occur 6923721 The new SYS_SMB privilege is not backward compatible 6937562 autofs doesn't remove its door when the zone shuts down 6937727 Zones stuck on deathrow; netstack_zone keeps a credential reference to the zone 6940159 Implement PSARC 2010/072
show more ...
|
#
91b2cbb3 |
| 13-Apr-2010 |
gww <gww@eng.sun.com> |
6935410 setting audit context when audit is not enabled should be more tolerant of getaddrinfo failure
|
#
982b4ad2 |
| 05-Jun-2009 |
Casper H.S. Dik <Casper.Dik@Sun.COM> |
PSARC 2007/072 PRIV_AWARE_RESET 6452447 Need the ability to limit each and every privilege on login
|
#
ad84d946 |
| 23-Mar-2009 |
Joep Vesseur <Joep.Vesseur@Sun.COM> |
6588644 When audit is enabled and the tty or host fails to build the terminalid, the syslog could be better
|
#
b9175c69 |
| 16-Jan-2009 |
Kenjiro Tsuji <Kenjiro.Tsuji@Sun.COM> |
6783069 libc must not use defread internally
|
#
95dd9389 |
| 03-Sep-2008 |
Nils Goroll <nils.goroll@hamburg.de> |
6742084 PRIV_FILE_CHOWN_SELF granted in pam_sm_setcred even if pathconf returns EINVAL
|
#
bf430c99 |
| 27-Sep-2006 |
gww <none@none> |
PSARC/2006/534 remote user audit attribution update 6378304 PSARC/2005/009 is a security hole and must be ripped out 6473333 Implement PSARC/2006/534 remote user audit attribution update
|
#
97682a82 |
| 10-Mar-2006 |
casper <none@none> |
6346529 Login should not fail when unknown privileges are requested 6395043 having extra privileges prevents logins in zones
|
#
550493b6 |
| 14-Dec-2005 |
gww <none@none> |
6356419 establishing an audit context for system processes may fail in edge conditions
|
#
f3e0b6b1 |
| 07-Sep-2005 |
gww <none@none> |
6319578 pam_unix_cred.so.1 dumps core due to the use of incorrect buffer length
|
#
babf694c |
| 04-Jul-2005 |
rh87107 <none@none> |
6281689 rstchown=0 has no effect on chown(1)
|
#
7c478bd9 |
| 14-Jun-2005 |
stevel@tonic-gate <none@none> |
OpenSolaris Launch
|