Package: libpam-runtime
Version: 1.4.0-11
Severity: critical
Justification: breaks the whole system

Dear Maintainer,

   * Upgrade to the unstable version of libpam-runtime_1.14.0_11_all
   with 
   ```
   auth    [success=0 default=ignore]      pam_ssh.so use_first_pass
   ```
   * Login then failed
   * I've modified "success=0" -> "success=1" to get back the login.



-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'stable-debug'), (500, 
'oldstable-updates'), (500, 'oldstable-debug'), (500, 'unstable'), (500, 
'testing'), (500, 'stable'), (500, 'oldstable'), (100, 'buster-fasttrack'), 
(100, 'buster-backports'), (100, 'bullseye-fasttrack'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.15.0-2-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE=fr
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libpam-runtime depends on:
ii  debconf [debconf-2.0]  1.5.79
ii  libpam-modules         1.4.0-11

libpam-runtime recommends no packages.

libpam-runtime suggests no packages.

-- debconf information:
  libpam-runtime/conflicts:
  libpam-runtime/override: false
* libpam-runtime/profiles: passwdqc, unix, ssh-pwd, tmpdir, systemd
  libpam-runtime/no_profiles_chosen:
  libpam-runtime/title:

-- 
Vincent-Xavier JUMEL Id: 0xBC8C2BAB14ABB3F2 https://blog.thetys-retz.net

Société Libre, Logiciel Libre http://www.april.org/adherer
Parinux, logiciel libre à Paris : http://www.parinux.org

Reply via email to