Your message dated Thu, 29 Sep 2005 05:47:08 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#330458: fixed in pam 0.79-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 28 Sep 2005 05:44:30 +0000
>From [EMAIL PROTECTED] Tue Sep 27 22:44:30 2005
Return-path: <[EMAIL PROTECTED]>
Received: from thorn.pobox.com [208.210.124.75] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EKUk2-0005KM-00; Tue, 27 Sep 2005 22:44:30 -0700
Received: from thorn (localhost [127.0.0.1])
        by thorn.pobox.com (Postfix) with ESMTP id 15BA5B0;
        Wed, 28 Sep 2005 01:33:51 -0400 (EDT)
Received: from zabaione.sinusforschung.com (ppp-82-135-6-3.mnet-online.de 
[82.135.6.3])
        (using TLSv1 with cipher AES256-SHA (256/256 bits))
        (No client certificate requested)
        by thorn.sasl.smtp.pobox.com (Postfix) with ESMTP id C7A513D22;
        Wed, 28 Sep 2005 01:33:49 -0400 (EDT)
Received: from akr by zabaione.sinusforschung.com with local (Exim 4.52)
        id 1EKUju-0006qg-0G; Wed, 28 Sep 2005 07:44:22 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Andreas Kroschel <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libpam-modules: doesn't read /etc/environment
X-Mailer: reportbug 3.17
Date: Wed, 28 Sep 2005 07:44:21 +0200
Message-Id: <[EMAIL PROTECTED]>
Sender: Andreas Kroschel <[EMAIL PROTECTED]>
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
X-SA-Exim-Scanned: No (on zabaione.sinusforschung.com); SAEximRunCond expanded 
to false
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libpam-modules
Version: 0.79-1
Severity: important


Since the upgrade to 0.79-1, environment variables in /etc/environment
are not being read anymore when doing a login. Setting default
environment variables in /etc/security/pam_env.conf still works.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'proposed-updates'), (500, 'oldstable'), 
(500, 'stable'), (10, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to de_DE.UTF-8)

Versions of packages libpam-modules depends on:
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  libcap1                       1:1.10-14  support for getting/setting POSIX.
ii  libdb3                        3.2.9-22   Berkeley v3 Database Libraries [ru
ii  libpam0g                      0.79-1     Pluggable Authentication Modules l
ii  libselinux1                   1.26-1     SELinux shared libraries

libpam-modules recommends no packages.

-- no debconf information

---------------------------------------
Received: (at 330458-close) by bugs.debian.org; 29 Sep 2005 12:48:07 +0000
>From [EMAIL PROTECTED] Thu Sep 29 05:48:07 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1EKxoa-0001C2-00; Thu, 29 Sep 2005 05:47:08 -0700
From: Steve Langasek <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#330458: fixed in pam 0.79-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 29 Sep 2005 05:47:08 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: pam
Source-Version: 0.79-2

We believe that the bug you reported is fixed in the latest version of
pam, which is due to be installed in the Debian FTP archive:

libpam-cracklib_0.79-2_i386.deb
  to pool/main/p/pam/libpam-cracklib_0.79-2_i386.deb
libpam-doc_0.79-2_all.deb
  to pool/main/p/pam/libpam-doc_0.79-2_all.deb
libpam-modules_0.79-2_i386.deb
  to pool/main/p/pam/libpam-modules_0.79-2_i386.deb
libpam-runtime_0.79-2_all.deb
  to pool/main/p/pam/libpam-runtime_0.79-2_all.deb
libpam0g-dev_0.79-2_i386.deb
  to pool/main/p/pam/libpam0g-dev_0.79-2_i386.deb
libpam0g_0.79-2_i386.deb
  to pool/main/p/pam/libpam0g_0.79-2_i386.deb
pam_0.79-2.diff.gz
  to pool/main/p/pam/pam_0.79-2.diff.gz
pam_0.79-2.dsc
  to pool/main/p/pam/pam_0.79-2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Langasek <[EMAIL PROTECTED]> (supplier of updated pam package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 27 Sep 2005 02:44:36 -0700
Source: pam
Binary: libpam0g-dev libpam0g libpam-modules libpam-doc libpam-runtime 
libpam-cracklib
Architecture: source i386 all
Version: 0.79-2
Distribution: unstable
Urgency: low
Maintainer: Sam Hartman <[EMAIL PROTECTED]>
Changed-By: Steve Langasek <[EMAIL PROTECTED]>
Description: 
 libpam-cracklib - PAM module to enable cracklib support.
 libpam-doc - Documentation of PAM
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam-runtime - Runtime support for the PAM library
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 165068 330458
Changes: 
 pam (0.79-2) unstable; urgency=low
 .
   The ".c.o: rm -rf $@" release
   * Fix debian/rules so that make clean doesn't remove ./configure when the
     timestamp on configure.in is newer (!).
   * Switch pam_userdb from db3 to db4.2, which according to the libdb
     maintainers should require no manual intervention for upgrading on-disk
     database formats.  Closes: #165068.
   * Patch 058:  yes, of course we want to read /etc/environment by
     default.  Grr!  Revert upstream change which disables this for no
     apparent reason (closes: #330458).
   * Tweak selinux rootok code to use the version of the function call that
     doesn't pollute namespace
Files: 
 5f60dc6bc46a76e956ee2f01a2f1e06d 937 base optional pam_0.79-2.dsc
 820299542c9994a59347e010baa1d6b3 127105 base optional pam_0.79-2.diff.gz
 68e27db80076a80f9fceae29e9fec1a2 63180 base required 
libpam-runtime_0.79-2_all.deb
 2fbf9600cc60e10d64075f00b300ffbc 674976 doc optional libpam-doc_0.79-2_all.deb
 b208c7517be21ce9225c36433725508f 77996 base required libpam0g_0.79-2_i386.deb
 f2e4ddce59af0ffbcd59e42a0e3735bb 181976 base required 
libpam-modules_0.79-2_i386.deb
 8d64784654cd640d2ce5837e18283d00 115758 libdevel optional 
libpam0g-dev_0.79-2_i386.deb
 2589311dd85ec7892ec8e1a6f54568a4 58112 libs optional 
libpam-cracklib_0.79-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDO96iKN6ufymYLloRAvfIAJ0TFH6fY/c9cmy5+EqIXuMPCaJ4IwCeKake
lfQXc8RkDj6TI8kKVmDKZDg=
=/k3K
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to