This bug was fixed in the package pam - 1.0.1-9ubuntu1
---------------
pam (1.0.1-9ubuntu1) jaunty; urgency=low
* Merge from Debian unstable
* Remaining changes:
- debian/libpam-modules.postinst: Add PATH to /etc/environment if it's not
present there or in /etc/security/pam_env.conf. (should send to Debian).
- debian/libpam0g.postinst: only ask questions during update-manager when
there are non-default services running.
- debian/patches-applied/series: Ubuntu patches are as below ...
- debian/patches-applied/ubuntu-fix_standard_types: Use standard u_int8_t
type rather than __u8.
- debian/patches-applied/ubuntu-no-error-if-missingok: add a new, magic
module option 'missingok' which will suppress logging of errors by
libpam if the module is not found.
- debian/patches-applied/ubuntu-regression_fix_securetty: prompt for
password on bad username.
- debian/patches-applied/ubuntu-rlimit_nice_correction: Explicitly
initialise RLIMIT_NICE rather than relying on the kernel limits.
- debian/patches-applied/ubuntu-user_defined_environment: Look at
~/.pam_environment too, with the same format as
/etc/security/pam_env.conf. (Originally patch 100; converted to quilt.)
- Change Vcs-Bzr to point at the Ubuntu branch.
- debian/local/common-password, debian/pam-configs/unix: switch from
"md5" to "sha512" as password crypt default.
pam (1.0.1-9) unstable; urgency=low
* Move the pam module packages to section 'admin'.
* 027_pam_limits_better_init_allow_explicit_root: defaults need to be
declared as LIMITS_DEF_DEFAULT instead of LIMITS_DEF_ALL, otherwise
global limits will fail to be applied. LP: #314222.
pam (1.0.1-8) unstable; urgency=low
* Updated debconf translations:
- Bulgarian, thanks to Damyan Ivanov <[email protected]> (closes: #518121)
- Spanish, thanks to Javier Fernandez-Sanguino Peña <[email protected]>
(closes: #518214)
- Swedish, thanks to Martin Bagge <[email protected]> (closes: #518324)
- Vietnamese, thanks to Clytie Siddall <[email protected]>
(closes: #518329)
- Japanese, thanks to Kenshi Muto <[email protected]> (closes: #518335)
- Slovak, thanks to Ivan Masár <[email protected]> (closes: #518341)
- Czech, thanks to Miroslav Kure <[email protected]> (closes: #518992)
- Portuguese, thanks to Américo Monteiro <[email protected]>
(closes: #519204)
- Galician, thanks to Marce Villarino <[email protected]>
(closes: #519447)
- Romanian, thanks to Eddy Petrișor <[email protected]>
(closes: #520552)
* 027_pam_limits_better_init_allow_explicit_root: set the RLIMIT_MEMLOCK
limit correctly to match the kernel default, which is not RLIM_INFINITY.
Closes: #472629.
-- Steve Langasek <[email protected]> Fri, 20 Mar 2009
19:12:10 -0700
** Changed in: pam (Ubuntu Jaunty)
Status: Fix Committed => Fix Released
--
setting core dump size to above 0 does not work in /etc/security/limits.conf
https://bugs.launchpad.net/bugs/314222
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs