Hi Chris,

Chris Hofstaedtler <z...@debian.org> ezt írta (időpont: 2021. ápr. 6., K, 9:30):
>
> Control: notfixed -1 pam 1.4.0-1
>
> * Bálint Réczey <bal...@balintreczey.hu> [210405 21:50]:
> > Control: fixed -1 pam 1.4.0-1
>
> Hello Bálint,
> and PAM Maintainers,
>
> > It seems this is fixed in pam.
>
> it appears upstream has applied this patch:
> https://github.com/linux-pam/linux-pam/commit/e842a5fc075002f46672ebcd8e896624f1ec8068
> But has not made a release yet. I also don't see this patch in
> (the rather unusual, I have to say) debian/patches-applied in the
> pam source package.
>
> Maybe the PAM maintainers want to include the upstream patch for
> bullseye?

This bug as I interpreted was about pam_unix, that carried a patch in
Debian to check /etc/securetty and this patch has been dropped in
1.4.0-1:

Changes:
 pam (1.4.0-1) unstable; urgency=medium
...
   * Drop patches to implement "nullok_secure" option for pam_unix.
     Closes: #674857, #936071, LP: #1860826.

Do you still observe the originally reported issue or an other
complaint from pam?

Cheers,
Balint

Reply via email to