Package: libnet-duo-perl
Version: 1.01-2
Severity: important
Tags: upstream

(Arguably this could be grave, although it only affects the admin APIs
and not the more-common auth API.)

As of March 15th, pagination will be required by Duo Security for some
admin APIs.  The affected APIs implemented by this module are the ones
that list users and integrations.

This is fixed in the upstream 1.02 release.  I'm preparing a new package
and am checking with the release team on how they want to handle this
update given where we are in the freeze process.

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-2-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libnet-duo-perl depends on:
ii  libjson-perl         4.02000-1
ii  libperl6-slurp-perl  0.051005-1
ii  libsub-install-perl  0.928-1
ii  liburi-perl          1.76-1
ii  libwww-perl          6.36-1
ii  perl                 5.28.1-4

libnet-duo-perl recommends no packages.

libnet-duo-perl suggests no packages.

-- no debconf information

Reply via email to