Package: libnet-duo-perl Version: 1.01-2 Severity: important Tags: upstream
(Arguably this could be grave, although it only affects the admin APIs and not the more-common auth API.) As of March 15th, pagination will be required by Duo Security for some admin APIs. The affected APIs implemented by this module are the ones that list users and integrations. This is fixed in the upstream 1.02 release. I'm preparing a new package and am checking with the release team on how they want to handle this update given where we are in the freeze process. -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (990, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-2-amd64 (SMP w/8 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages libnet-duo-perl depends on: ii libjson-perl 4.02000-1 ii libperl6-slurp-perl 0.051005-1 ii libsub-install-perl 0.928-1 ii liburi-perl 1.76-1 ii libwww-perl 6.36-1 ii perl 5.28.1-4 libnet-duo-perl recommends no packages. libnet-duo-perl suggests no packages. -- no debconf information