Your message dated Fri, 29 Aug 2008 06:17:03 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#496983: fixed in pam 1.0.1-4 has caused the Debian Bug report #496983, regarding unix_chkpwd not g+s on mips et al to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 496983: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496983 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems
--- Begin Message ---Package: libpam-modules Version: 1.0.1-3 Severity: grave Hi, the 1.0.1-3 build for libpam-modules on mips does not ship unix_chkpwd sgid, breaking everything that relies on it, say screen. [EMAIL PROTECTED]:/var/cache/apt/archives$ dpkg --contents libpam-modules_1.0.1-3_mips.deb | grep chk -rw-r--r-- root/root 651 2008-08-20 19:32 ./usr/share/man/man8/unix_chkpwd.8.gz -rwxr-xr-x root/shadow 34888 2008-08-20 19:32 ./sbin/unix_chkpwd [EMAIL PROTECTED]:/org/chroot$ ls -l */sbin/unix_chkpwd /sbin/unix_chkpwd -rwxr-xr-x 1 root shadow 34888 Aug 20 19:32 /sbin/unix_chkpwd* -r-sr-xr-x 1 root root 22188 Oct 22 2007 etch/sbin/unix_chkpwd* -rwxr-xr-x 1 root shadow 34888 Aug 20 19:32 lenny/sbin/unix_chkpwd* -rwxr-xr-x 1 root shadow 34888 Aug 20 19:32 sid/sbin/unix_chkpwd* [EMAIL PROTECTED]:/org/ftp.root/debian/pool/main/p/pam$ for i in libpam-modules_1.0.1-3_*; do dpkg --contents $i | grep sbin/unix_chkpwd | grep -q -v 'rwxr-sr-x' && echo $i; done libpam-modules_1.0.1-3_alpha.deb libpam-modules_1.0.1-3_mips.deb libpam-modules_1.0.1-3_mipsel.deb cheers, -- | .''`. ** Debian GNU/Linux ** Peter Palfrader | : :' : The universal http://www.palfrader.org/ | `. `' Operating System | `- http://www.debian.org/
--- End Message ---
--- Begin Message ---Source: pam Source-Version: 1.0.1-4 We believe that the bug you reported is fixed in the latest version of pam, which is due to be installed in the Debian FTP archive: libpam-cracklib_1.0.1-4_amd64.deb to pool/main/p/pam/libpam-cracklib_1.0.1-4_amd64.deb libpam-doc_1.0.1-4_all.deb to pool/main/p/pam/libpam-doc_1.0.1-4_all.deb libpam-modules_1.0.1-4_amd64.deb to pool/main/p/pam/libpam-modules_1.0.1-4_amd64.deb libpam-runtime_1.0.1-4_all.deb to pool/main/p/pam/libpam-runtime_1.0.1-4_all.deb libpam0g-dev_1.0.1-4_amd64.deb to pool/main/p/pam/libpam0g-dev_1.0.1-4_amd64.deb libpam0g_1.0.1-4_amd64.deb to pool/main/p/pam/libpam0g_1.0.1-4_amd64.deb pam_1.0.1-4.diff.gz to pool/main/p/pam/pam_1.0.1-4.diff.gz pam_1.0.1-4.dsc to pool/main/p/pam/pam_1.0.1-4.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve Langasek <[EMAIL PROTECTED]> (supplier of updated pam package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Thu, 28 Aug 2008 22:59:23 -0700 Source: pam Binary: libpam0g libpam-modules libpam-runtime libpam0g-dev libpam-cracklib libpam-doc Architecture: source all amd64 Version: 1.0.1-4 Distribution: unstable Urgency: high Maintainer: Steve Langasek <[EMAIL PROTECTED]> Changed-By: Steve Langasek <[EMAIL PROTECTED]> Description: libpam-cracklib - PAM module to enable cracklib support libpam-doc - Documentation of PAM libpam-modules - Pluggable Authentication Modules for PAM libpam-runtime - Runtime support for the PAM library libpam0g - Pluggable Authentication Modules library libpam0g-dev - Development files for PAM Closes: 495804 495879 496620 496983 Changes: pam (1.0.1-4) unstable; urgency=high . * High-urgency upload for RC bugfix. . [ Julien Cristau ] * pam_unix-chkpwd-wait: don't assume that the unix_chkpwd process exits normally; if it was killed by a signal, we don't want to accept the password. Closes: #495879. . [ Steve Langasek ] * 007_modules_pam_unix: update the manpage at the same time as the xml source (grr, autogenerated files in source packages). Closes: #495804. * 055_pam_unix_nullok_secure: also don't call the helper at all from _unix_blankpasswd when we can detect that null passwords are disallowed, to avoid causing spammy logs on successful authentications. Closes: #496620. * debian/rules: call chgrp *before* calling chmod, lest the sgid bit on unix_chkpwd be cleared during the build when using -rsudo. Closes: #496983. Checksums-Sha1: f209bde3aeca013cf5f16afd1f38e9bc35d51963 1457 pam_1.0.1-4.dsc 872d5b2a30b6e0975d53d78d1d727dfda9c16109 141570 pam_1.0.1-4.diff.gz 910d7ad4afaeeea9b4be97cccbb01375e5989fdf 165180 libpam-runtime_1.0.1-4_all.deb 602de9df3e7dcf3787ef32275c2169c72716357a 286674 libpam-doc_1.0.1-4_all.deb efb6ac51965dd912a5c09d384db3c969b0b9fc17 107630 libpam0g_1.0.1-4_amd64.deb b72e31b2f1ae886cdfe656cf35db00e0cbda3bb5 302974 libpam-modules_1.0.1-4_amd64.deb 899b1ddeccb656afee0103570d5ac50db100d5f2 162906 libpam0g-dev_1.0.1-4_amd64.deb a63bdc501642933b9bf2f732fe42fdb2a1994094 65134 libpam-cracklib_1.0.1-4_amd64.deb Checksums-Sha256: 44bd1136d631935723ada717be0019b6237e38c39ce017304656e5c9e7c0fbc8 1457 pam_1.0.1-4.dsc d775e4754e9c6e4565446c747f0526c92c8ed831f7bbc76251b6024055c24742 141570 pam_1.0.1-4.diff.gz b29090a941d1f8c2f99886ca9f153ad7583250f21b43a93f3e00fbd85c970084 165180 libpam-runtime_1.0.1-4_all.deb e10d8031b24be335dfff42f93f85a25371dcebbf4a34f07eba032f5d1d85985e 286674 libpam-doc_1.0.1-4_all.deb b3602d12f4f82a153c753149db9217727c6d523062a4f8d22cbc2c617eaccfaf 107630 libpam0g_1.0.1-4_amd64.deb 32968668b4c4b36aa4540c213f7bd947d6f0ea969b455cc05f68501174c2b75e 302974 libpam-modules_1.0.1-4_amd64.deb e639b0d6297e48de0c8230dab51b7b50d27b1bbb4eb0c5d36eb1eed772d583a0 162906 libpam0g-dev_1.0.1-4_amd64.deb e728a1452334c30e4d272801574cca514fd86ecf2cf3aa6532f0055a950978c3 65134 libpam-cracklib_1.0.1-4_amd64.deb Files: 6b8c5d1b69093a884380c4f61e1cd9e2 1457 libs optional pam_1.0.1-4.dsc ed6fac1c626d70fe280ecb91d5e9a89d 141570 libs optional pam_1.0.1-4.diff.gz a8dc047d5b261e243f8a2d1d73ec8731 165180 admin required libpam-runtime_1.0.1-4_all.deb 409484e3b36ab518a74f9f98d2953193 286674 doc optional libpam-doc_1.0.1-4_all.deb 0f350542eb41d9dac3b1a8c79acfe8ab 107630 libs required libpam0g_1.0.1-4_amd64.deb c6c040170a701afb12a0c0cdb9f3eb79 302974 libs required libpam-modules_1.0.1-4_amd64.deb a22e01f528cbf5d9a147c4ebe2494ade 162906 libdevel optional libpam0g-dev_1.0.1-4_amd64.deb ffc67282bb4a9eff59ad2d9a3cd79bd4 65134 libs optional libpam-cracklib_1.0.1-4_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIt5JSKN6ufymYLloRAs/yAJ0TF61MACYA1OwLdCMDjGRpQyj3/gCeNdcz XNpjRdYi0Ij+g67A1ib3Zks= =iH/Y -----END PGP SIGNATURE-----
--- End Message ---

