Your message dated Tue, 02 Dec 2008 23:32:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#507194: fixed in libpam-mount 0.44-1+lenny3
has caused the Debian Bug report #507194,
regarding libpam-mount: segfault at login for users with crypted volume, so for
them NO LOGIN POSSIBLE
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
507194: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507194
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libpam-mount
Version: 0.44-1+lenny2
Severity: critical
Justification: breaks the whole system
this is what happens since the last upgrade ( by date of the files it
was 2008-11-25 ) :
-----
login cokejunkie
Passwort:
pam_mount(pam_mount.c:306) saving authtok for session code
(authtok=0x86d6698)
Letzte Anmeldung: Freitag, den 28. November 2008, 16:42:44 CET auf pts/1
pam_mount(pam_mount.c:458) Entered pam_mount session stage
pam_mount(pam_mount.c:479) back from global readconfig
pam_mount(pam_mount.c:481) per-user configurations not allowed by
pam_mount.conf.xml
Speicherzugriffsfehler
-----
one volume line from the /etc/security/pam_mount.conf.xml
( i have tested all volumes seperetly, just to be sure )
----
<volume fskeycipher="aes-256-ecb" options="cipher=aes"
fskeypath="/etc/keys/sda3.cokejunkie" user="cokejunkie"
mountpoint="/media/sda3" path="/dev/sda3" fstype="crypt" />
----
for users with encrypted volumes there is NO LOGIN POSSIBLE! it renders
my system unusable. without the crypted volumes, there is no need to
login at all... ( now i am glad that root does not have any encrypted
volumes! )
login is only possible, if all crypted volumes for the user are
commented out.
the same problem exists on a different machine with debian/testing.
-- System Information:
Debian Release: lenny/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages libpam-mount depends on:
ii debconf 1.5.24 Debian configuration
management sy
ii libc6 2.7-16 GNU C Library: Shared
libraries
ii libhx13 1.18-1 A library providing queue,
tree, I
ii libpam0g 1.0.1-4 Pluggable Authentication
Modules l
ii libssl0.9.8 0.9.8g-14 SSL shared libraries
ii libxml-writer-perl 0.604-1 Perl module for writing XML
docume
ii libxml2 2.6.32.dfsg-5 GNOME XML library
ii mount 2.13.1.1-1 Tools for mounting and
manipulatin
libpam-mount recommends no packages.
Versions of packages libpam-mount suggests:
ii cryptsetup 2:1.0.6-6 configures encrypted block
devices
pn davfs2 <none> (no description available)
ii fuse-utils 2.7.4-1.1 Filesystem in USErspace
(utilities
ii lsof 4.78.dfsg.1-4 List open files
pn ncpfs <none> (no description available)
ii openssl 0.9.8g-14 Secure Socket Layer (SSL)
binary a
ii psmisc 22.6-1 Utilities that use the proc
filesy
ii smbfs 2:3.2.4-1 mount and umount commands
for the
ii splashutils [psmisc] 1.5.3.3-2 Splashutils main package
pn truecrypt-utils <none> (no description available)
-- debconf information:
libpam-mount/convert-xml-config: false
--- End Message ---
--- Begin Message ---
Source: libpam-mount
Source-Version: 0.44-1+lenny3
We believe that the bug you reported is fixed in the latest version of
libpam-mount, which is due to be installed in the Debian FTP archive:
libpam-mount_0.44-1+lenny3.diff.gz
to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3.diff.gz
libpam-mount_0.44-1+lenny3.dsc
to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3.dsc
libpam-mount_0.44-1+lenny3_amd64.deb
to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 03 Dec 2008 00:13:39 +0100
Source: libpam-mount
Binary: libpam-mount
Architecture: source amd64
Version: 0.44-1+lenny3
Distribution: testing-security
Urgency: high
Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]>
Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]>
Description:
libpam-mount - PAM module that can mount volumes for a user session
Closes: 507194 507199 507257 507592
Changes:
libpam-mount (0.44-1+lenny3) testing-security; urgency=high
.
* Fix the expand_home segfault by using a much simpler patch for the
expand_user() function.
(Closes: #507199, #507257, #507592, #507194)
Checksums-Sha1:
f7bdc58325550adfa218c55b3f551d3e6013ac75 1249 libpam-mount_0.44-1+lenny3.dsc
9c8214c31b2555512624b210debb510544fdb8f9 25926
libpam-mount_0.44-1+lenny3.diff.gz
8e2393b2e8a55c56f1d5c69506d7bd49b982ebaf 105732
libpam-mount_0.44-1+lenny3_amd64.deb
Checksums-Sha256:
40da725640fa6749068d4d6693aea2a6032cd6a0725710340f5bb17db077c80a 1249
libpam-mount_0.44-1+lenny3.dsc
4336eeae00ff0b92a544c83eb258232879f60a9a533ae3dffefe30cc286ebf99 25926
libpam-mount_0.44-1+lenny3.diff.gz
c1dbb1b89674f9e9f6b4c1496253ca93099ab7c796c028ee8f0deebab3d7bbff 105732
libpam-mount_0.44-1+lenny3_amd64.deb
Files:
43d2ac1c868803c174a6f6a1f39644ba 1249 admin extra
libpam-mount_0.44-1+lenny3.dsc
f19ebf88200b932b409da3d19a25ec94 25926 admin extra
libpam-mount_0.44-1+lenny3.diff.gz
5d9bdc7b4b1ea52dc878e2e63241560d 105732 admin extra
libpam-mount_0.44-1+lenny3_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkk1wioACgkQeBwlBDLsbz47LgCfVk6jCIYsvtE0NEJNXCJEqH7S
QcMAn2A+KI8NkB/Vj+XeF9H0qxQik08h
=1112
-----END PGP SIGNATURE-----
--- End Message ---