Package: libpam-runtime Version: 1.4.0-11 Severity: critical Justification: breaks the whole system
Dear Maintainer, * Upgrade to the unstable version of libpam-runtime_1.14.0_11_all with ``` auth [success=0 default=ignore] pam_ssh.so use_first_pass ``` * Login then failed * I've modified "success=0" -> "success=1" to get back the login. -- System Information: Debian Release: bookworm/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'stable-debug'), (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 'oldstable'), (100, 'buster-fasttrack'), (100, 'buster-backports'), (100, 'bullseye-fasttrack'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 5.15.0-2-amd64 (SMP w/4 CPU threads) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE=fr Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages libpam-runtime depends on: ii debconf [debconf-2.0] 1.5.79 ii libpam-modules 1.4.0-11 libpam-runtime recommends no packages. libpam-runtime suggests no packages. -- debconf information: libpam-runtime/conflicts: libpam-runtime/override: false * libpam-runtime/profiles: passwdqc, unix, ssh-pwd, tmpdir, systemd libpam-runtime/no_profiles_chosen: libpam-runtime/title: -- Vincent-Xavier JUMEL Id: 0xBC8C2BAB14ABB3F2 https://blog.thetys-retz.net Société Libre, Logiciel Libre http://www.april.org/adherer Parinux, logiciel libre à Paris : http://www.parinux.org