This bug was fixed in the package pam - 1.1.8-3.2ubuntu2.3
---
pam (1.1.8-3.2ubuntu2.3) xenial; urgency=medium
* Move patch fixing LP: #1666203 from debian/patches to
debian/patches-applied so it actually gets applied.
* debian/libpam-modules.postinst: Add /snap/bin to $PATH
Verified the new upload on xenial:
root@xenial-pam-play:~# dpkg -l libpam-modules
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name
Hello Toru, or anyone else affected,
Accepted pam into xenial-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/pam/1.1.8-3.2ubuntu2.3
in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
** Changed in: pam (Ubuntu Xenial)
Status: Won't Fix => In Progress
** Changed in: pam (Ubuntu Xenial)
Assignee: Don van der Haghen (donvdh) => Michael Hudson-Doyle (mwhudson)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
The version of pam in the proposed pocket of Xenial that was purported
to fix this bug report has been removed because the bugs that were to be
fixed by the upload were not verified in a timely (105 days) fashion.
** Tags removed: verification-needed-xenial
** Changed in: pam (Ubuntu Xenial)
@David have you tested the version of the package in -proposed and does
it work for you? If so could you please provide testing details so that
we can release the package.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Hello!
Thanks for your work with creating and testing the patch.
When Xenial Fix will be released?
I'd love to see it, because activation of Proposed repo on dozens hosts does
not looks very good.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Hi Don-san.
I tried test, but it not fixed.
I tried building by source code of version 1.1.8-3.2ubuntu 2.2, it looks like
the patch has not been applied.
Can you check again?
[VERIFICATION XENIAL]
1) Used vagrant init ubuntu/xenial64 to create new instance.
2) Used vagrant ssh to login.
3)
Thanks!
[VERIFICATION XENIAL]
1) Used vagrant init ubuntu/xenial64 to create new instance.
2) Used vagrant ssh to login.
3) Added "session required pam_tty_audit.so enable=*" at the top of
/etc/pam.d/common-session
5) Installed 1.1.8-3.2ubuntu2.2 from xenial-proposed
6) Tried to use in with new
Hello Toru, or anyone else affected,
Accepted pam into xenial-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/pam/1.1.8-3.2ubuntu2.2
in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
Uploaded to Xenial.
For future reference, the patches directory goes inside debian/
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
** Tags removed: verification-needed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To manage notifications about this bug go to:
This bug was fixed in the package pam - 1.1.8-3.6ubuntu3
---
pam (1.1.8-3.6ubuntu3) cosmic; urgency=medium
* debian/patches-applied/fix-pam_tty_audit.patch: (LP: #1666203)
Fix pam_tty_audit log_passwd support and regression.
-- Eric Desrochers Thu, 28 Feb 2019
01:20:35
This bug was fixed in the package pam - 1.1.8-3.6ubuntu2.18.04.1
---
pam (1.1.8-3.6ubuntu2.18.04.1) bionic; urgency=medium
* debian/patches-applied/fix-pam_tty_audit.patch: (LP: #1666203)
Fix pam_tty_audit log_passwd support and regression.
-- Eric Desrochers Wed, 27 Feb
** Description changed:
[Impact]
* Kernel keystroke auditing via pam_tty_audit.so not working
* When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it
failed in pam_open_session.
It was triggared by use uninitialized variable in
@Donvdh,
Thanks I'll have a look at it probably next week. Thanks !
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To manage notifications
[VERIFICATION COSMIC]
1) Used vagrant init ubuntu/cosmic64 to create new instance.
2) Used vagrant ssh to login.
3) Added "session required pam_tty_audit.so enable=*" at the top of
/etc/pam.d/common-session
4) Tried to use in with new vagrant ssh session (package 1.1.8-3.6ubuntu2):
DOES NOT
Sorry for the delay and thanks for the feedback and effort Eric!
Please find the new Xenial debdiff (xenial-fix-for-lp-1666203-v2.debdiff)
attached.
I tested the update and verified that it works.
I also tested the Bionic update and verified that it works as intended.
** Patch added:
[VERIFICATION BIONIC]
It has been brought to my attention the following (by an impacted user):
I have enabled the "-proposed" pocket and done the following:
1) Logged into workstation, elevated to root
2) Installed packages from "-proposed": libpam0g libpam-modules
libpam-modules-bin
Hello Toru, or anyone else affected,
Accepted pam into cosmic-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/pam/1.1.8-3.6ubuntu3
in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
Uploaded for Bionic and Cosmic.
** Description changed:
[Impact]
- * Kernel keystroke auditing via pam_tty_audit.so not working
-
- * When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it
failed in pam_open_session.
-It was triggared by use uninitialized variable in
Don,
I'll take care of patching Bionic and Cosmic, and I will let you handle
Xenial, if you don't mind through the Ubuntu sponsorship.
I have reviewed your Xenial debdiff, and it will need some rework.
The patch requires to be in quilt (debian/patches-applied), and not file
manipulate directly
** Changed in: pam (Ubuntu Bionic)
Assignee: Don van der Haghen (donvdh) => Eric Desrochers (slashd)
** Changed in: pam (Ubuntu Bionic)
Importance: High => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I have provided a test package to an impacted user for Bionic/18.04LTS.
Here's what has been brought to my attention after this user tried the test
package:
"Test results look good. Keystroke logging audit messages are coming through."
--
You received this bug notification because you are a
** Changed in: pam (Ubuntu Cosmic)
Status: New => In Progress
** Changed in: pam (Ubuntu Cosmic)
Importance: Undecided => Medium
** Changed in: pam (Ubuntu Cosmic)
Assignee: (unassigned) => Eric Desrochers (slashd)
--
You received this bug notification because you are a member
** Description changed:
+ [Impact]
+
+ * Kernel keystroke auditing via pam_tty_audit.so not working
+
+ * When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it
failed in pam_open_session.
+It was triggared by use uninitialized variable in
Don van der Haghen (donvdh),
Seems like you need a sponsor. If I sponsor the patch for you, will you
be amenable to test the packages once found in $RELEASE-proposed ?
If cosmic is impacted, could you also please provide a debdiff for it,
before I proceed.
Regards,
Eric
** Tags added: sts
**
and could you please fill the SRU template ?
https://wiki.ubuntu.com/StableReleaseUpdates
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To
** Changed in: pam (Ubuntu Xenial)
Importance: Undecided => High
** Changed in: pam (Ubuntu Bionic)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: pam (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: pam (Ubuntu Bionic)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
I have opened bug tasks for the bionic and xenial releases. Your
patches are in the queue for the ubuntu-sponsors team to review.
** Also affects: pam (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: pam (Ubuntu Xenial)
Importance: Undecided
Status: New
--
Thanks Steve!
However, what is the status for Xenial and Bionic?
The bug seems closed now (status: fix released), can someone reopen it?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
** Description changed:
Dear Maintainer.
I found a bug in pam_tty_audit.
When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it failed
in pam_open_session.
It was triggared by use uninitialized variable in
pam_tty_audit.c::pam_open_session.
* Enviroments
Ubuntu
** Description changed:
Dear Maintainer.
I found a bug in pam_tty_audit.
When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it failed
in pam_open_session.
It was triggared by use uninitialized variable in
pam_tty_audit.c::pam_open_session.
* Enviroments
Ubuntu
** Changed in: pam (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To manage notifications about
This has been fixed for disco with the upload of pam 1.3.1-2ubuntu1.
** Changed in: pam (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
Please see attached patch for Ubuntu 16.04/Xenial.
I have tested and verified that the patch works as intended.
** Patch added: "xenial-fix-for-lp-1666203.debdiff"
https://bugs.launchpad.net/debian/+source/pam/+bug/1666203/+attachment/5236239/+files/xenial-fix-for-lp-1666203.debdiff
--
You
Thank you all very much for the responses.
I added the description, origin and bug headers to the bionical debdiff,
new debdiff is attached.
I was able to reproduce the issue on xenial using vagrant, I will create
and test a patch.
** Patch added: "bionic-fix-for-lp-1666203-v2.debdiff"
Don, I've looked closer at the code and I agree with you.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To manage notifications about this
Hi Don-san.
I am able to reproduce with the following procedure.
-
vagrant init ubuntu/xenial64
vagrant ssh
# at xenial64 on VM
echo 'session required pam_tty_audit.so enable=*' | sudo tee -a
/etc/pam.d/common-session
-
When 'vagrant ssh' from other terminal, it
Hello Don, probably an SRU sponsor would like the debdiff to include
references where to find the patch that you applied in upstream sources
or other bug reports. The usual way to do so is via a Description: and
Origin: header in the patch, see https://dep-
team.pages.debian.net/deps/dep3/ for
Thank you both very much for the responses.
Toru: I just tested this on another 16.04 system (now with kernel
4.4.0-142-generic) and was unable to reproduce the issue there also. I
was able to reproduce the issue on both Bionic systems I tested however.
So there seems to be a difference between
I also tested with commit https://github.com/linux-pam/linux-
pam/commit/05a1ccc0df92d0ca031699124ddf7ec3ce12f78f#diff-
c5b734a338a8a0460af7f0c08a7b138a which fixes yet another uninitialized
use.
Resulting pam_tty_audit.so with both mentioned upstream commits tested
and works on bionic, cosmic,
Thank you for your response.
I tested on 16.04/xenial with below packages, but this issue still exists.
libpam-modules-bin 1.1.8-3.2ubuntu2.1
linux-image-4.4.0-137-generic 4.4.0-137.163
This issue has been fixed on the PAM 1.2.0, but 16.04/xenial and
18.04/bionic used the
I am unable to reproduce this issue on Ubuntu 16.04/Xenial with:
libpam-modules 1.1.8-3.2ubuntu2.1
kernel 4.4.0-112-generic
Toru Ikezoe: Could you verify whether this issue still exists on 16.04?
I currently have no plans on testing with Ubuntu 14.04 because of end of
support on april 2019.
**
The attachment "bionic-fix-for-lp-1666203.debdiff" seems to be a
debdiff. The ubuntu-sponsors team has been subscribed to the bug report
so that they can review and hopefully sponsor the debdiff. If the
attachment isn't a patch, please remove the "patch" flag from the
attachment, remove the
Attached patch (which is based on pam_1.1.8-3.6ubuntu2) fixes the issue for
Ubuntu 18.04/Bionic
Following fix was implemented as mentioned by the reporter of the LP bug:
https://github.com/linux-pam/linux-pam/commit/c5f829931a22c65feffee16570efdae036524bee
I tested the patch and it indeed
** Tags added: trusty xen
** Tags removed: xen
** Tags added: cosmic disco xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To manage
** Changed in: pam (Debian)
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To manage notifications about this
** Bug watch added: Debian Bug tracker #778664
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778664
** Also affects: pam (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778664
Importance: Unknown
Status: Unknown
--
You received this bug notification because
** Tags added: bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
pam_tty_audit failed in pam_open_session
To manage notifications about this bug go to:
Please see https://wiki.ubuntu.com/SponsorshipProcess and
https://wiki.ubuntu.com/StableReleaseUpdates#Procedure if you can
volunteer to get the fix landed. Note that I don't expect anyone to work
on this any time soon. It needs volunteers.
--
You received this bug notification because you are a
** Changed in: pam (Ubuntu)
Status: Confirmed => Triaged
** Changed in: pam (Ubuntu)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
** Description changed:
Dear Maintainer.
I found a bug in pam_tty_audit.
When Using the pam_tty_audit with other pam modules(ex, pam_ldap), it failed
in pam_open_session.
It was triggared by use uninitialized variable in
pam_tty_audit.c::pam_open_session.
* Enviroments
Ubuntu
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: pam (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1666203
Title:
56 matches
Mail list logo