Your message dated Sat, 01 Sep 2007 01:47:13 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#439984: fixed in pam 0.99.7.1-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: libpam0g
Version: 0.99.7.1-2
Severity: grave
Justification: renders package unusable


Can not login into linux console, getting:

Bad item passed to pam_*_item()

Reboot the linux don't help.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-1-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpam0g depends on:
ii  libc6                         2.6.1-1+b1 GNU C Library: Shared libraries
ii  libpam-runtime                0.99.7.1-2 Runtime support for the PAM librar

libpam0g recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: pam
Source-Version: 0.99.7.1-4

We believe that the bug you reported is fixed in the latest version of
pam, which is due to be installed in the Debian FTP archive:

libpam-cracklib_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam-cracklib_0.99.7.1-4_amd64.deb
libpam-cracklib_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam-cracklib_0.99.7.1-4_i386.deb
libpam-doc_0.99.7.1-4_all.deb
  to pool/main/p/pam/libpam-doc_0.99.7.1-4_all.deb
libpam-modules_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam-modules_0.99.7.1-4_amd64.deb
libpam-modules_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam-modules_0.99.7.1-4_i386.deb
libpam-runtime_0.99.7.1-4_all.deb
  to pool/main/p/pam/libpam-runtime_0.99.7.1-4_all.deb
libpam0g-dev_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam0g-dev_0.99.7.1-4_amd64.deb
libpam0g-dev_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam0g-dev_0.99.7.1-4_i386.deb
libpam0g_0.99.7.1-4_amd64.deb
  to pool/main/p/pam/libpam0g_0.99.7.1-4_amd64.deb
libpam0g_0.99.7.1-4_i386.deb
  to pool/main/p/pam/libpam0g_0.99.7.1-4_i386.deb
pam_0.99.7.1-4.diff.gz
  to pool/main/p/pam/pam_0.99.7.1-4.diff.gz
pam_0.99.7.1-4.dsc
  to pool/main/p/pam/pam_0.99.7.1-4.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Langasek <[EMAIL PROTECTED]> (supplier of updated pam package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 31 Aug 2007 17:11:05 -0700
Source: pam
Binary: libpam0g-dev libpam0g libpam-modules libpam-doc libpam-runtime 
libpam-cracklib
Architecture: source amd64 all i386
Version: 0.99.7.1-4
Distribution: unstable
Urgency: low
Maintainer: Steve Langasek <[EMAIL PROTECTED]>
Changed-By: Steve Langasek <[EMAIL PROTECTED]>
Description: 
 libpam-doc - Documentation of PAM
 libpam-runtime - Runtime support for the PAM library
 libpam-cracklib - PAM module to enable cracklib support
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 389197 439984 440019 440074 440355 440362 440368
Changes: 
 pam (0.99.7.1-4) unstable; urgency=low
 .
   * libpam0g.postinst, libpam0g.templates: gdm doesn't need to be restarted
     to fix the library skew, only reloaded; special-case this daemon in the
     postinst and remove the mention of it from the debconf template, also
     tightening the language of the debconf template in the process.
     Closes: #440074.
   * Add courier-authdaemon to the list of services that need to be
     restarted; thanks to Micah Anderson for reporting.
   * New patch pam_env_ignore_garbage.patch: fix pam_env to really skip over
     garbage lines in /etc/environment and log an error, instead of failing
     with an obscure error; and ignore any PAM_BAD_ITEM values returned
     by pam_putenv(), since this is the expected error return when trying
     to delete a non-existent var.  Closes: #439984.
   * Yet another thinko in hurd_no_setfsuid and in
     029_pam_limits_capabilities; this code should really be Hurd-safe at
     last...
   * getline() returns -1 on EOF, not 0; check this appropriately, to fix
     an infinite loop in pam_rhosts_auth.  Thanks to Stephan Springl
     <[EMAIL PROTECTED]> for the fix.  Closes: #440019.
   * Use ${misc:Depends} for libpam0g, so we get a proper dependency on
     debconf.
   * 019_pam_listfile_quiet: per discussion with upstream, don't suppress
     errors about missing files or files with wrong permissions; these are
     real errors that should not be buried.
   * Drop the remainder of 061_pam_issue_double_free, not required for the
     original bugfix.
   * Drop patch 064_pam_unix_cracklib_dictpath, which is not needed now that
     we define CRACKLIB_DICTS in debian/rules.
   * Drop patch 063_paswd_segv, superseded by a different upstream fix
   * Split 047_pam_limits_chroot_string_value up between
     008_modules_pam_limits_chroot and 029_pam_limits_capabilites
   * Updates to patch 007_modules_pam_unix: restore the same built-in min
     password len of 6 that upstream uses; fix a typo panlindrome ->
     palindrome.
   * The 'max=' option was never intended to be used to limit maximum password
     length for users, only to declare what the number of significant
     characters /is/ for a password.  But we don't need a config option to
     tell us that, we know the answer based on which crypt type we're using,
     so drop this as a config file option.  Closes: #389197.
   * Debconf translations:
     - Spanish, thanks to Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]>
     - Vietnamese, thanks to Clytie Siddall <[EMAIL PROTECTED]>
     - German, thanks to Sven Joachim <[EMAIL PROTECTED]> (closes: #440355)
     - Czech, thanks to Miroslav Kure <[EMAIL PROTECTED]>
       (closes: #440362)
     - Portuguese, thanks to Américo Monteiro <[EMAIL PROTECTED]>
       (closes: #440368)
Files: 
 cb4a600503b243b112ec18f630a5fb76 1160 libs optional pam_0.99.7.1-4.dsc
 b1de189bf361284f0f2f8d38a16300fe 113312 libs optional pam_0.99.7.1-4.diff.gz
 2e3b058f0ac92d72fa07939da9932290 97762 admin required 
libpam-runtime_0.99.7.1-4_all.deb
 6aa82d016aa8a28ece06cc7273a1239d 265992 doc optional 
libpam-doc_0.99.7.1-4_all.deb
 b33b386e594f347e232568513e0155a3 81968 libs required 
libpam0g_0.99.7.1-4_amd64.deb
 1f9fe17fbd79447a0d6c659230c1f766 264606 libs required 
libpam-modules_0.99.7.1-4_amd64.deb
 a060a2ddae3ae4b9c38a9279d1cabe3d 143794 libdevel optional 
libpam0g-dev_0.99.7.1-4_amd64.deb
 b15b34811d2d2e71b90773765f26e702 49176 libs optional 
libpam-cracklib_0.99.7.1-4_amd64.deb
 34a3a8266af72cf2fb31afa542480b3c 79088 libs required 
libpam0g_0.99.7.1-4_i386.deb
 33a816ef585667a473a3fd8cd2572e34 253190 libs required 
libpam-modules_0.99.7.1-4_i386.deb
 178c6163ea43924525a2316126468a84 141836 libdevel optional 
libpam0g-dev_0.99.7.1-4_i386.deb
 10386ea56a7b8e51c4f0e872bbe86358 49170 libs optional 
libpam-cracklib_0.99.7.1-4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG2MAVKN6ufymYLloRAhv3AJ9e1dh8G/qB4IV9UtIEoYcUfQiMhACghydF
LnoLJ9s7yN0B3ScYF+nYCWo=
=PkA/
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to