The pam_tally and pam_tally2 modules have been dropped from Debian in
pam 1.4.0-1.
---
Changes:
pam (1.4.0-1) unstable; urgency=medium
.
* New upstream release. Closes: #948188.
- Stop using obsoleted selinux headers. Closes: #956355.
- Continue building pam_cracklib, which is deprecated upstream;
the replacement, pam_passwdqc, is packaged separately.
- Update symbols file for new symbols.
- Refresh lintian overrides for changes to available pam modules.
* Drop patches to implement "nullok_secure" option for pam_unix.
Closes: #674857, #936071, LP: #1860826.
* debian/patches-applied/cve-2010-4708.patch: drop, applied upstream.
* debian/patches-applied/nullok_secure-compat.patch: Support
nullok_secure as a deprecated alias for nullok.
* debian/pam-configs/unix: use nullok, not nullok_secure.
* Drop pam_tally and pam_tally2 modules, which have been deprecated
upstream in favor of pam_faillock. Closes: #569746, LP: #772121.
* Add hardening+=bindnow to build options, per lintian.
** Changed in: pam (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/772121
Title:
typo in pam_tally manpage
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/772121/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs