Your message dated Sun, 29 Jun 2025 18:04:27 +0000
with message-id <[email protected]>
and subject line Bug#1103339: fixed in pam 1.7.0-5
has caused the Debian Bug report #1103339,
regarding pam_access improperly checks for group membership of a user.
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1103339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103339
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: pam
Version: 1.7.0-3
Severity: important
Tags: upstream
Dear Maintainer,
When a user is member of a group configured in /etc/security/access.conf,
pam_access.so fails to match the user against this group.
See also https://github.com/linux-pam/linux-pam/issues/860
-- System Information:
Debian Release: trixie/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.12.21-amd64 (SMP w/1 CPU thread; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Source: pam
Source-Version: 1.7.0-5
Done: Sam Hartman <[email protected]>
We believe that the bug you reported is fixed in the latest version of
pam, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sam Hartman <[email protected]> (supplier of updated pam package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 29 Jun 2025 11:40:46 -0600
Source: pam
Architecture: source
Version: 1.7.0-5
Distribution: unstable
Urgency: high
Maintainer: Sam Hartman <[email protected]>
Changed-By: Sam Hartman <[email protected]>
Closes: 629438 1103339 1107919
Changes:
pam (1.7.0-5) unstable; urgency=high
.
* pam_access: backport upstream commit to implement nodns option to allow
people to work around #1087019
.
pam (1.7.0-4) experimental; urgency=high
.
[ Gioele Barabucci ]
* d/control: Update standards version to 4.7.0, no changes needed
* d/TODO: Remove outdated item about fop (Closes: #629438)
.
[ Sam Hartman ]
* Fix CVE-2025-6020: local privilege escalation in pam_namespace, Closes:
1107919
.
[ James Morris ]
* pam_access improperly checks for group membership of a user.
(Closes: #1103339)
Checksums-Sha1:
dc44d975a3cee93b2e116db4682b90abc8a11f31 2210 pam_1.7.0-5.dsc
e27bfdcceb1294670f95467e4ce4e2455ce841c7 145640 pam_1.7.0-5.debian.tar.xz
Checksums-Sha256:
5c127aa18c7cb52ec9ee91fa2099453b3a851bcc0088e79045384a2a508b341c 2210
pam_1.7.0-5.dsc
d776d7cb6fc8b08273f96b7f843299356ef13c6756e30468c594ab28faf1701c 145640
pam_1.7.0-5.debian.tar.xz
Files:
561580b7e93506f94a63bfc44f839bd4 2210 libs optional pam_1.7.0-5.dsc
8b227938c26350801ea2472d00c52c58 145640 libs optional pam_1.7.0-5.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQSj2jRwbAdKzGY/4uAsbEw8qDeGdAUCaGF7eAAKCRAsbEw8qDeG
dMtaAQCUgFh51jmuFD7DenBgFukipl2sy5huidU54Mp7cl5H1gEAz71k3wK9eXn9
jfYAc9zZHjKBRKVXReuwr4o3Wn3zFgk=
=lGzz
-----END PGP SIGNATURE-----
pgp1KUw7AbS7Z.pgp
Description: PGP signature
--- End Message ---