On Sun, 27 May 2012 21:53:59 +0200
Jakub Wilk wrote:
> >It seems that this only happens when a user wants to unlock the
> >screen, not when logging in.
>
> Does it happen regardless of whether the entered password was correct
> or not?
This is always happening, regardless of if the password is
severity 544687 serious
owner 544687 !
thanks
* Christoph Pleger , 2012-05-24, 10:33:
That is, unix2_chkpwd is called recursively again and again and the
user cannot be authenticated.
It seems that this only happens when a user wants to unlock the screen,
not when logging in.
Does it happen r
> That is, unix2_chkpwd is called recursively again and again and the user
> cannot be authenticated.
It seems that this only happens when a user wants to unlock the screen,
not when logging in.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscrib
Hello,
though I obviously do not have the exactly same bug occurring, because the
corresponding change that introduced my bug took place two days after
Jakub's last message, I add my bug description to this report, because my
bug fits perfectly to the subject. That is, unix2_chkpwd is called
recur
tags 544687 + unreproducible
thanks
* Michael Fladischer , 2012-01-12, 07:33:
I couldn't reproduce this bug. Could you tell use how exactly to do
that? Including your full PAM configuration would be probably helpful.
I'm also no longer able to reproduce this as i switched to pam_sssd a
long t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 01/12/2012 01:24 AM, Jakub Wilk wrote:
> I couldn't reproduce this bug. Could you tell use how exactly to
> do that? Including your full PAM configuration would be probably
> helpful.
I'm also no longer able to reproduce this as i switched to pam_s
* Fladischer Michael , 2009-09-02, 13:38:
If an application with a UID greater than 0 tries to authenticate a
user using pam_unix2.so (e.g. gnome-screensaver or su) it starts to
forks numerous instances of the helper binary unix2_chkpwd:
PID TTY STAT TIME COMMAND
7690 pts/2Ss
Package: libpam-unix2
Version: 1:2.4.1-4
Severity: important
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
If an application with a UID greater than 0 tries to authenticate a user
using pam_unix2.so (e.g. gnome-screensaver or su) it starts to forks
numerous instances of the helper binary unix2_ch
8 matches
Mail list logo