Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-05-29 Thread Christoph Pleger
On Sun, 27 May 2012 21:53:59 +0200 Jakub Wilk jw...@debian.org wrote: It seems that this only happens when a user wants to unlock the screen, not when logging in. Does it happen regardless of whether the entered password was correct or not? This is always happening, regardless of if the

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-05-27 Thread Jakub Wilk
severity 544687 serious owner 544687 ! thanks * Christoph Pleger christoph.ple...@cs.tu-dortmund.de, 2012-05-24, 10:33: That is, unix2_chkpwd is called recursively again and again and the user cannot be authenticated. It seems that this only happens when a user wants to unlock the screen, not

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-05-24 Thread Christoph Pleger
Hello, though I obviously do not have the exactly same bug occurring, because the corresponding change that introduced my bug took place two days after Jakub's last message, I add my bug description to this report, because my bug fits perfectly to the subject. That is, unix2_chkpwd is called

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-05-24 Thread Christoph Pleger
That is, unix2_chkpwd is called recursively again and again and the user cannot be authenticated. It seems that this only happens when a user wants to unlock the screen, not when logging in. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe.

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-01-12 Thread Jakub Wilk
tags 544687 + unreproducible thanks * Michael Fladischer mich...@fladi.at, 2012-01-12, 07:33: I couldn't reproduce this bug. Could you tell use how exactly to do that? Including your full PAM configuration would be probably helpful. I'm also no longer able to reproduce this as i switched to

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-01-11 Thread Jakub Wilk
* Fladischer Michael fladischermich...@fladi.at, 2009-09-02, 13:38: If an application with a UID greater than 0 tries to authenticate a user using pam_unix2.so (e.g. gnome-screensaver or su) it starts to forks numerous instances of the helper binary unix2_chkpwd: PID TTY STAT TIME

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-01-11 Thread Michael Fladischer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 01/12/2012 01:24 AM, Jakub Wilk wrote: I couldn't reproduce this bug. Could you tell use how exactly to do that? Including your full PAM configuration would be probably helpful. I'm also no longer able to reproduce this as i switched to

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2009-09-02 Thread Fladischer Michael
Package: libpam-unix2 Version: 1:2.4.1-4 Severity: important -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 If an application with a UID greater than 0 tries to authenticate a user using pam_unix2.so (e.g. gnome-screensaver or su) it starts to forks numerous instances of the helper binary