On Wed, Sep 30, 2009 at 09:13:31AM +0200, Guido Bozzetto wrote:
> Package: libpam-cracklib
> Version: 1.1.0-4
> Severity: minor

> After the packages upgrade appears on auth.log file the following messages:

> Sep 27 04:15:01 debian CRON[30595]: PAM unable to 
> dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version 
> `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so)
> Sep 27 04:15:01 debian CRON[30595]: PAM adding faulty module: 
> /lib/security/pam_cracklib.so
> Sep 27 04:15:01 debian CRON[30594]: PAM unable to 
> dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version 
> `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so)
> Sep 27 04:15:01 debian CRON[30594]: PAM adding faulty module: 
> /lib/security/pam_cracklib.so
> Sep 27 04:15:01 debian CRON[30598]: PAM unable to 
> dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version 
> `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so)
> Sep 27 04:15:01 debian CRON[30598]: PAM adding faulty module: 
> /lib/security/pam_cracklib.so
> Sep 27 04:16:01 debian CRON[30626]: PAM unable to 
> dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version 
> `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so)
> Sep 27 04:16:01 debian CRON[30626]: PAM adding faulty module: 
> /lib/security/pam_cracklib.so
> Sep 27 04:17:01 debian CRON[30649]: PAM unable to 
> dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version 
> `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so)
> Sep 27 04:17:01 debian CRON[30649]: PAM adding faulty module: 
> /lib/security/pam_cracklib.so
> Sep 27 04:18:01 debian CRON[30693]: PAM unable to 
> dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version 
> `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so)
> Sep 27 04:18:01 debian CRON[30693]: PAM adding faulty module: 
> /lib/security/pam_cracklib.so

> in the /etc/pam.d there is:
> debian:~# grep cracklib /etc/pam.d/*
> /etc/pam.d/common-password:password   requisite                       
> pam_cracklib.so retry=3 minlen=8 difok=3

This is handled on upgrade of the libpam0g package, on which libpam-cracklib
has a correct dependency:

        if dpkg --compare-versions "$2" lt 1.1.0; then
            echo -n "Checking for services that may need to be restarted..."
            [...]
            check="$check cron cups"
            [...]
            echo "Checking init scripts..."
            services=$(installed_services "$check")
            if [ -n "$services" ]; then
                db_reset libpam0g/restart-services
                db_set libpam0g/restart-services "$services"
                db_input critical libpam0g/restart-services || true
                db_go || true
                db_get libpam0g/restart-services

                if [ "x$RET" != "x" ]
                then
                    services=$RET
                else
                    services=""
                fi
            [...]
        fi

If you overrode the list of services to restart, or have configured your
system to not display critical debconf questions, then that's your bug, not
ours...

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                    http://www.debian.org/
slanga...@ubuntu.com                                     vor...@debian.org

Attachment: signature.asc
Description: Digital signature

Reply via email to