On Wed, Sep 30, 2009 at 09:13:31AM +0200, Guido Bozzetto wrote: > Package: libpam-cracklib > Version: 1.1.0-4 > Severity: minor
> After the packages upgrade appears on auth.log file the following messages: > Sep 27 04:15:01 debian CRON[30595]: PAM unable to > dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version > `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so) > Sep 27 04:15:01 debian CRON[30595]: PAM adding faulty module: > /lib/security/pam_cracklib.so > Sep 27 04:15:01 debian CRON[30594]: PAM unable to > dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version > `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so) > Sep 27 04:15:01 debian CRON[30594]: PAM adding faulty module: > /lib/security/pam_cracklib.so > Sep 27 04:15:01 debian CRON[30598]: PAM unable to > dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version > `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so) > Sep 27 04:15:01 debian CRON[30598]: PAM adding faulty module: > /lib/security/pam_cracklib.so > Sep 27 04:16:01 debian CRON[30626]: PAM unable to > dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version > `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so) > Sep 27 04:16:01 debian CRON[30626]: PAM adding faulty module: > /lib/security/pam_cracklib.so > Sep 27 04:17:01 debian CRON[30649]: PAM unable to > dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version > `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so) > Sep 27 04:17:01 debian CRON[30649]: PAM adding faulty module: > /lib/security/pam_cracklib.so > Sep 27 04:18:01 debian CRON[30693]: PAM unable to > dlopen(/lib/security/pam_cracklib.so): /lib/libpam.so.0: version > `LIBPAM_EXTENSION_1.1' not found (required by /lib/security/pam_cracklib.so) > Sep 27 04:18:01 debian CRON[30693]: PAM adding faulty module: > /lib/security/pam_cracklib.so > in the /etc/pam.d there is: > debian:~# grep cracklib /etc/pam.d/* > /etc/pam.d/common-password:password requisite > pam_cracklib.so retry=3 minlen=8 difok=3 This is handled on upgrade of the libpam0g package, on which libpam-cracklib has a correct dependency: if dpkg --compare-versions "$2" lt 1.1.0; then echo -n "Checking for services that may need to be restarted..." [...] check="$check cron cups" [...] echo "Checking init scripts..." services=$(installed_services "$check") if [ -n "$services" ]; then db_reset libpam0g/restart-services db_set libpam0g/restart-services "$services" db_input critical libpam0g/restart-services || true db_go || true db_get libpam0g/restart-services if [ "x$RET" != "x" ] then services=$RET else services="" fi [...] fi If you overrode the list of services to restart, or have configured your system to not display critical debconf questions, then that's your bug, not ours... -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developer http://www.debian.org/ slanga...@ubuntu.com vor...@debian.org
signature.asc
Description: Digital signature