Processing commands for cont...@bugs.debian.org: > #shadow (1:4.1.4.3-1) UNRELEASED; urgency=low > # > # * New upstream release: > # - Fix formatting of the login.defs.5 manpage. Closes: #542804 > # - Updated Czech translation. Closes: #548407 > # - Updated Vietnamese translation. Closes: #548065 > # - Remove patches applied upstream: > # + debian/patches/008_su_no_sanitize_env > # - Updated patches: > # + debian/patches/523_su_arguments_are_no_more_concatenated_by_default > # - Added support for dates already specified as a number of days since > # Epoch in useradd, usermod and chage. Closes: #562221 > # * debian/login.pam: return back to mostly "requisite" for the pam_securetty > # PAM module, but ignore PAM_USER_UNKNOWN. This will avoid root from > # entering a password, and will also avoid user enumeration attacks. > # Mis-typed root login are not protected, only root can be blamed for > # mis-typing and entering a password on an insecure line. Users willing to > # protect against mis-typed root login can use "requisite", but will be > # vulnerable to user enumeration attacks on insecure lines, and should use > # pam 1.1.0-4 at least. Closes: #574082, #531341 > # > limit source shadow Limiting to bugs with field 'source' containing at least one of 'shadow' Limit currently set to 'source':'shadow'
> tags 562221 + pending Bug #562221 [passwd] manpages of passwd and usermod report wrong instructions about locking accounts Added tag(s) pending. > tags 574082 + pending Bug #574082 [login] Please go back to "requisite" for pam_securetty in login.pam Added tag(s) pending. > tags 531341 + pending Bug #531341 [login] prints "login incorrect" without asking for password when entering an invalid login Added tag(s) pending. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org