Your message dated Fri, 28 Sep 2007 09:02:16 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#441843: fixed in pam 0.99.7.1-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: libpam0g
Version: 0.99.7.1-4
Severity: important



Upgrading libpam, it tries to restart xdm.
However, aptitude was lauched from a X session. Thus the brutal stop
of xdm crashes the session, leaving libpam packages half-configured,
and other open documents in various states (dangerous).




-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-k7 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpam0g depends on:
ii  debconf [debconf-2.0]         1.5.14     Debian configuration management sy
ii  libc6                         2.6.1-2    GNU C Library: Shared libraries
ii  libpam-runtime                0.99.7.1-4 Runtime support for the PAM librar

libpam0g recommends no packages.

-- debconf information:
* libpam0g/restart-services: saslauthd samba pure-ftpd postgresql-8.1 netatalk 
cupsys cron atd
  libpam0g/restart-failed:



--- End Message ---
--- Begin Message ---
Source: pam
Source-Version: 0.99.7.1-5

We believe that the bug you reported is fixed in the latest version of
pam, which is due to be installed in the Debian FTP archive:

libpam-cracklib_0.99.7.1-5_amd64.deb
  to pool/main/p/pam/libpam-cracklib_0.99.7.1-5_amd64.deb
libpam-cracklib_0.99.7.1-5_i386.deb
  to pool/main/p/pam/libpam-cracklib_0.99.7.1-5_i386.deb
libpam-doc_0.99.7.1-5_all.deb
  to pool/main/p/pam/libpam-doc_0.99.7.1-5_all.deb
libpam-modules_0.99.7.1-5_amd64.deb
  to pool/main/p/pam/libpam-modules_0.99.7.1-5_amd64.deb
libpam-modules_0.99.7.1-5_i386.deb
  to pool/main/p/pam/libpam-modules_0.99.7.1-5_i386.deb
libpam-runtime_0.99.7.1-5_all.deb
  to pool/main/p/pam/libpam-runtime_0.99.7.1-5_all.deb
libpam0g-dev_0.99.7.1-5_amd64.deb
  to pool/main/p/pam/libpam0g-dev_0.99.7.1-5_amd64.deb
libpam0g-dev_0.99.7.1-5_i386.deb
  to pool/main/p/pam/libpam0g-dev_0.99.7.1-5_i386.deb
libpam0g_0.99.7.1-5_amd64.deb
  to pool/main/p/pam/libpam0g_0.99.7.1-5_amd64.deb
libpam0g_0.99.7.1-5_i386.deb
  to pool/main/p/pam/libpam0g_0.99.7.1-5_i386.deb
pam_0.99.7.1-5.diff.gz
  to pool/main/p/pam/pam_0.99.7.1-5.diff.gz
pam_0.99.7.1-5.dsc
  to pool/main/p/pam/pam_0.99.7.1-5.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Langasek <[EMAIL PROTECTED]> (supplier of updated pam package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 28 Sep 2007 00:17:00 -0700
Source: pam
Binary: libpam0g-dev libpam0g libpam-modules libpam-doc libpam-runtime 
libpam-cracklib
Architecture: source amd64 all i386
Version: 0.99.7.1-5
Distribution: unstable
Urgency: low
Maintainer: Steve Langasek <[EMAIL PROTECTED]>
Changed-By: Steve Langasek <[EMAIL PROTECTED]>
Description: 
 libpam-doc - Documentation of PAM
 libpam-runtime - Runtime support for the PAM library
 libpam-cracklib - PAM module to enable cracklib support
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 414559 440130 440385 440390 440800 440953 441325 441843 441863 442276 
443720 443924 444039
Changes: 
 pam (0.99.7.1-5) unstable; urgency=low
 .
   * More lintian overrides, related to debconf prompting in the postinst
   * Debconf translations:
     - Brazilian Portuguese, thanks to Eder L. Marques <[EMAIL PROTECTED]>
       (closes: #440385)
     - Russian, thanks to Yuri Kozlov <[EMAIL PROTECTED]>
       (closes: #440390, #440953, #444039)
     - Bulgarian, thanks to Damyan Ivanov <[EMAIL PROTECTED]>
       (closes: #441863)
     - Finnish, thanks to Esko Arajärvi <[EMAIL PROTECTED]> (closes: #443720)
     - Simplified Chinese, thanks to Ming Hua
       <[EMAIL PROTECTED]> (closes: #443924)
     - Updated Portuguese, thanks to Américo Monteiro <[EMAIL PROTECTED]>
     - Updated Vietnamese, thanks to Clytie Siddall <[EMAIL PROTECTED]>
       (closes: #440800)
     - Updated German, thanks to Sven Joachim <[EMAIL PROTECTED]>
     - Updated Spanish, thanks to Javier Fernández-Sanguino Peña
       <[EMAIL PROTECTED]>
     - Updated Czech, thanks to Miroslav Kure <[EMAIL PROTECTED]>
       (closes: #441325)
   * Further cleanups of 007_modules_pam_unix -- don't use a global variable
     for pass_min_len, don't gratuitously move the length checking into the
     "obscure" checks, and internationalize the error strings.
   * Stop overriding the built-in default minimum password length in
     /etc/pam.d/common-password, and also drop the "max" option which has now
     been obsoleted.
   * Fix up the comments in /etc/pam.d/common-password to make it clear that
     the options are specific to pam_unix.  Closes: #414559.
   * Patch 038: fix another thinko in the getline handling.  Closes: #442276.
   * If there are active X logins, don't restart kdm, wdm, and xdm by default;
     instead, display a debconf error if they haven't been restarted.
     Closes: #441843.
   * Drop the local patch for Linux capabilities in pam_limits; Linux
     capabilities are not generally useful in a PAM context, and the PAM
     capabilities patch has been broken through much of its life.
     Closes: #440130.
   * -Wl,-z,defs was never enabled correctly, drop it since upstream is
     already using -no-undefined
   * Pass --build and --host args to ./configure as necessary, for
     cross-building support.
Files: 
 e8b83cc2adfadc56e5994d0892d76d1f 1091 libs optional pam_0.99.7.1-5.dsc
 62002a360a23c5c31da0927e5cb2f313 116562 libs optional pam_0.99.7.1-5.diff.gz
 4b5eed09231a7bc50d5ada24fc561440 99156 admin required 
libpam-runtime_0.99.7.1-5_all.deb
 a166bd09d4ea1967149964d7a80c4ae5 267316 doc optional 
libpam-doc_0.99.7.1-5_all.deb
 c0d002b7ce47691e55629b89d1171c76 85980 libs required 
libpam0g_0.99.7.1-5_amd64.deb
 add92762fffcf21b0a592b178d70dcd6 265690 libs required 
libpam-modules_0.99.7.1-5_amd64.deb
 447910e5e1f972984769169dd4394725 145142 libdevel optional 
libpam0g-dev_0.99.7.1-5_amd64.deb
 31aed277b439c15fa662482e137cfb0c 50512 libs optional 
libpam-cracklib_0.99.7.1-5_amd64.deb
 c12c6cd776f8ed7ca0476cc888959e46 83048 libs required 
libpam0g_0.99.7.1-5_i386.deb
 5ed986e593786413efee83f6583b6922 250246 libs required 
libpam-modules_0.99.7.1-5_i386.deb
 9752976595f67a2da4d5db734a940989 143106 libdevel optional 
libpam0g-dev_0.99.7.1-5_i386.deb
 6b6c3fc9b7548f9d0d8e310e400523e8 50528 libs optional 
libpam-cracklib_0.99.7.1-5_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/LTGKN6ufymYLloRAotlAKCYLzqhdCap+6T+/B8hy8kMGQkCzQCgxBDh
MwA/9CngFCxI9UYU9j6+GcI=
=rNdR
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to