Hi Chris, Chris Hofstaedtler <z...@debian.org> ezt írta (időpont: 2021. ápr. 6., K, 9:30): > > Control: notfixed -1 pam 1.4.0-1 > > * Bálint Réczey <bal...@balintreczey.hu> [210405 21:50]: > > Control: fixed -1 pam 1.4.0-1 > > Hello Bálint, > and PAM Maintainers, > > > It seems this is fixed in pam. > > it appears upstream has applied this patch: > https://github.com/linux-pam/linux-pam/commit/e842a5fc075002f46672ebcd8e896624f1ec8068 > But has not made a release yet. I also don't see this patch in > (the rather unusual, I have to say) debian/patches-applied in the > pam source package. > > Maybe the PAM maintainers want to include the upstream patch for > bullseye?
This bug as I interpreted was about pam_unix, that carried a patch in Debian to check /etc/securetty and this patch has been dropped in 1.4.0-1: Changes: pam (1.4.0-1) unstable; urgency=medium ... * Drop patches to implement "nullok_secure" option for pam_unix. Closes: #674857, #936071, LP: #1860826. Do you still observe the originally reported issue or an other complaint from pam? Cheers, Balint