Bug#1022073: pam-u2f: new upstream release 1.2.1 available

2023-06-13 Thread adam
The fix for this vulnerability (CVE-2021-31924) was backported and included in the NMU version 1.1.0-1.1. References: - https://github.com/Yubico/pam-u2f/issues/175 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987545#39 There are still functionality issues with the version that is

Bug#1022073: pam-u2f: new upstream release 1.2.1 available

2023-04-23 Thread Adam
Is there any process I can initiate to get the upstream versions into Debian while the package maintainer (nicoo) is away? It's been 9 months since I submitted the merge request to go from 1.1.0 to 1.1.1. I'd like to do more to help, but I'm not sure how to proceed. -- Adam Hacker

Bug#1022073: pam-u2f: new upstream release 1.2.1 available

2023-02-22 Thread Enrique Garcia
Package: libpam-u2f Version: 1.1.0-1.1+b1 Followup-For: Bug #1022073 X-Debbugs-Cc: cqu...@arcor.de The following blog from yubico, who are the developers of libpam-u2f recommends using at least version 1.1.1 since there is a risk of local PIN bypass:

Bug#1022073: pam-u2f: new upstream release 1.2.1 available

2022-10-19 Thread Daniel Kahn Gillmor
Package: src:pam-u2f Version: 1.1.0-1.1 Upstream has released version 1.2.1. There are also several pending merge requests in salsa to update this package at least to 1.1.1, all from the same user with the handle @adam_hax ("Adam Hacker"):