Your message dated Tue, 02 Dec 2008 23:32:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#507194: fixed in libpam-mount 0.44-1+lenny3
has caused the Debian Bug report #507194,
regarding libpam-mount: segfault after upgrade to 0.44-1+lenny2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
507194: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507194
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libpam-mount
Version: 0.44-1+lenny2
Severity: important

After upgrading  0.44-1+lenny1 -> 0.44-1+lenny2
libpam-mount fails to mount with the following 
messages:
login[4670]: pam_mount(pam_mount.c:306) saving authtok for session code 
(authtok=0x21cab40)
login[4670]: pam_unix(login:session): session opened for user XXXXX by 
LOGIN(uid=0)
login[4670]: pam_mount(pam_mount.c:458) Entered pam_mount session stage
login[4670]: pam_mount(pam_mount.c:479) back from global readconfig
login[4670]: pam_mount(pam_mount.c:481) per-user configurations not allowed by 
pam_mount.conf.xml

login[4317]: segfault at 656d6f682f ip 7f0b2cfe640b sp 7fff37a17f40 error 4 in 
pam_mount.so[7f0b2cfdf00 0+10000]


-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (900, 'testing'), (600, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpam-mount depends on:
ii  debconf                    1.5.24        Debian configuration management sy
ii  libc6                      2.7-16        GNU C Library: Shared libraries
ii  libhx13                    1.18-1        A library providing queue, tree, I
ii  libpam0g                   1.0.1-4+b1    Pluggable Authentication Modules l
ii  libssl0.9.8                0.9.8g-14     SSL shared libraries
ii  libxml-writer-perl         0.604-1       Perl module for writing XML docume
ii  libxml2                    2.6.32.dfsg-5 GNOME XML library
ii  mount                      2.13.1.1-1    Tools for mounting and manipulatin

libpam-mount recommends no packages.

Versions of packages libpam-mount suggests:
ii  cryptsetup                 2:1.0.6-6     configures encrypted block devices
pn  davfs2                     <none>        (no description available)
ii  fuse-utils                 2.7.4-1.1     Filesystem in USErspace (utilities
ii  lsof                       4.78.dfsg.1-4 List open files
pn  ncpfs                      <none>        (no description available)
ii  openssl                    0.9.8g-14     Secure Socket Layer (SSL) binary a
ii  psmisc                     22.6-1        Utilities that use the proc filesy
pn  smbfs                      <none>        (no description available)
pn  truecrypt-utils            <none>        (no description available)

-- debconf information:
  libpam-mount/convert-xml-config: false



--- End Message ---
--- Begin Message ---
Source: libpam-mount
Source-Version: 0.44-1+lenny3

We believe that the bug you reported is fixed in the latest version of
libpam-mount, which is due to be installed in the Debian FTP archive:

libpam-mount_0.44-1+lenny3.diff.gz
  to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3.diff.gz
libpam-mount_0.44-1+lenny3.dsc
  to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3.dsc
libpam-mount_0.44-1+lenny3_amd64.deb
  to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 03 Dec 2008 00:13:39 +0100
Source: libpam-mount
Binary: libpam-mount
Architecture: source amd64
Version: 0.44-1+lenny3
Distribution: testing-security
Urgency: high
Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]>
Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]>
Description: 
 libpam-mount - PAM module that can mount volumes for a user session
Closes: 507194 507199 507257 507592
Changes: 
 libpam-mount (0.44-1+lenny3) testing-security; urgency=high
 .
   * Fix the expand_home segfault by using a much simpler patch for the
     expand_user() function.
     (Closes: #507199, #507257, #507592, #507194)
Checksums-Sha1: 
 f7bdc58325550adfa218c55b3f551d3e6013ac75 1249 libpam-mount_0.44-1+lenny3.dsc
 9c8214c31b2555512624b210debb510544fdb8f9 25926 
libpam-mount_0.44-1+lenny3.diff.gz
 8e2393b2e8a55c56f1d5c69506d7bd49b982ebaf 105732 
libpam-mount_0.44-1+lenny3_amd64.deb
Checksums-Sha256: 
 40da725640fa6749068d4d6693aea2a6032cd6a0725710340f5bb17db077c80a 1249 
libpam-mount_0.44-1+lenny3.dsc
 4336eeae00ff0b92a544c83eb258232879f60a9a533ae3dffefe30cc286ebf99 25926 
libpam-mount_0.44-1+lenny3.diff.gz
 c1dbb1b89674f9e9f6b4c1496253ca93099ab7c796c028ee8f0deebab3d7bbff 105732 
libpam-mount_0.44-1+lenny3_amd64.deb
Files: 
 43d2ac1c868803c174a6f6a1f39644ba 1249 admin extra 
libpam-mount_0.44-1+lenny3.dsc
 f19ebf88200b932b409da3d19a25ec94 25926 admin extra 
libpam-mount_0.44-1+lenny3.diff.gz
 5d9bdc7b4b1ea52dc878e2e63241560d 105732 admin extra 
libpam-mount_0.44-1+lenny3_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkk1wioACgkQeBwlBDLsbz47LgCfVk6jCIYsvtE0NEJNXCJEqH7S
QcMAn2A+KI8NkB/Vj+XeF9H0qxQik08h
=1112
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to