Your message dated Thu, 28 Apr 2005 14:47:30 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#306594: fixed in libpam-mount 0.9.22-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 27 Apr 2005 16:10:48 +0000
>From [EMAIL PROTECTED] Wed Apr 27 09:10:47 2005
Return-path: <[EMAIL PROTECTED]>
Received: from smtp-2.hut.fi [130.233.228.92] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DQp7f-0002cf-00; Wed, 27 Apr 2005 09:10:47 -0700
Received: from localhost (putosiko.hut.fi [130.233.228.114])
        by smtp-2.hut.fi (8.12.10/8.12.10) with ESMTP id j3RGAGHh023398
        for <[EMAIL PROTECTED]>; Wed, 27 Apr 2005 19:10:16 +0300
Received: from smtp-2.hut.fi ([130.233.228.92])
 by localhost (putosiko.hut.fi [130.233.228.114]) (amavisd-new, port 10024)
 with LMTP id 00683-47 for <[EMAIL PROTECTED]>;
 Wed, 27 Apr 2005 19:10:15 +0300 (EEST)
Received: from localhost.localdomain (vipunen.hut.fi [130.233.228.9])
        by smtp-2.hut.fi (8.12.10/8.12.10) with ESMTP id j3RG9wkM023363
        for <[EMAIL PROTECTED]>; Wed, 27 Apr 2005 19:10:02 +0300
From: Eero =?iso-8859-1?q?H=E4kkinen?= <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libpam-mount: Does not pipe password for losetup thus fails to fsck on 
encrypted mounts
X-Reportbug-Version: 3.8
X-Debbugs-Cc: [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 18:09:53 +0200
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <[EMAIL PROTECTED]>
X-TKK-Virus-Scanned: by amavisd-new-2.1.2-hutcc at putosiko.hut.fi
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-9.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
        HAS_PACKAGE,X_DEBBUGS_CC autolearn=ham 
        version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: libpam-mount
Version: 0.9.22-6
Severity: normal

libpam-mount tries to use losetup and fsck to check a loop back file 
system before mounting it. However, limpam-mount does not pipe the 
password to losetup, thus losetup will fail if the file system is 
password protected. After losetup fails, fsck cannot success.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: powerpc (ppc)
Kernel: Linux 2.6.11-powerpc
Locale: [EMAIL PROTECTED], LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8)

Versions of packages libpam-mount depends on:
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries 
an
ii  libglib2.0-0                2.6.4-1      The GLib library of C routines
ii  libssl0.9.7                 0.9.7e-3     SSL shared libraries
ii  mount                       2.12-10      Tools for mounting and 
manipulatin
ii  zlib1g                      1:1.2.2-3    compression library - runtime

-- no debconf information

---------------------------------------
Received: (at 306594-close) by bugs.debian.org; 28 Apr 2005 18:53:08 +0000
>From [EMAIL PROTECTED] Thu Apr 28 11:53:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DRE8K-0008QB-00; Thu, 28 Apr 2005 11:53:08 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DRE2s-0003js-00; Thu, 28 Apr 2005 14:47:30 -0400
From: Bastian Kleineidam <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#306594: fixed in libpam-mount 0.9.22-7
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 28 Apr 2005 14:47:30 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: libpam-mount
Source-Version: 0.9.22-7

We believe that the bug you reported is fixed in the latest version of
libpam-mount, which is due to be installed in the Debian FTP archive:

libpam-mount_0.9.22-7.diff.gz
  to pool/main/libp/libpam-mount/libpam-mount_0.9.22-7.diff.gz
libpam-mount_0.9.22-7.dsc
  to pool/main/libp/libpam-mount/libpam-mount_0.9.22-7.dsc
libpam-mount_0.9.22-7_i386.deb
  to pool/main/libp/libpam-mount/libpam-mount_0.9.22-7_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 28 Apr 2005 17:59:44 +0200
Source: libpam-mount
Binary: libpam-mount
Architecture: source i386
Version: 0.9.22-7
Distribution: unstable
Urgency: low
Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]>
Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]>
Description: 
 libpam-mount - a PAM module that can mount volumes for a user session
Closes: 306594
Changes: 
 libpam-mount (0.9.22-7) unstable; urgency=low
 .
   * added better error reporting when calling pmvarrun
   * on losetup call pipe password to stdin (Closes: #306594)
   * fix example pam_mount.conf line in README.Debian for local loopback
     encrypted volume
Files: 
 d96fccae59c32cc6947c6e7a8e112b74 669 admin extra libpam-mount_0.9.22-7.dsc
 74d07656ab338900ffb38971cb070513 54740 admin extra 
libpam-mount_0.9.22-7.diff.gz
 114fb9a9af6fd2e656309e26c77acab5 103602 admin extra 
libpam-mount_0.9.22-7_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCcSzSeBwlBDLsbz4RAhEEAJ9D6dF7DzIAk+APyJjXYLuG/jKXGQCgz5Br
wRtbh7BiLm7nyI3aJodtif4=
=X2M9
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to