This bug was fixed in the package pam - 1.1.1-1ubuntu1 --------------- pam (1.1.1-1ubuntu1) lucid; urgency=low
* Merge from Debian, remaining changes: - debian/libpam-modules.postinst: Add PATH to /etc/environment if it's not present there or in /etc/security/pam_env.conf. (should send to Debian). - debian/libpam0g.postinst: only ask questions during update-manager when there are non-default services running. - debian/patches-applied/series: Ubuntu patches are as below ... - debian/patches-applied/ubuntu-no-error-if-missingok: add a new, magic module option 'missingok' which will suppress logging of errors by libpam if the module is not found. - debian/patches-applied/ubuntu-rlimit_nice_correction: Explicitly initialise RLIMIT_NICE rather than relying on the kernel limits. - Change Vcs-Bzr to point at the Ubuntu branch. - Make libpam-modules depend on base-files (>= 5.0.0ubuntu6), to ensure run-parts does the right thing in /etc/update-motd.d. - debian/patches-applied/pam_motd-legal-notice: display the contents of /etc/legal once, then set a flag in the user's homedir to prevent showing it again. - debian/local/common-{auth,account,password}.md5sums: include the Ubuntu-specific intrepid,jaunty md5sums for use during the common-session-noninteractive upgrade. pam (1.1.1-1) unstable; urgency=low * New upstream version. - restore proper netgroup handling in pam_access. Closes: #567385, LP: #513955. * Drop patches pam.d-manpage-section, namespace_with_awk_not_gawk, and pam_securetty_tty_check_before_user_check, which are included upstream. * debian/patches/026_pam_unix_passwd_unknown_user: don't return PAM_USER_UNKNOWN on password change of a user that has no shadow entry, upstream now implements auto-creating the shadow entry in this case. * Updated debconf translations: - French, thanks to Jean-Baka Domelevo Entfellner <domel...@gmail.com> (closes: #547039) - Bulgarian, thanks to Damyan Ivanov <d...@debian.org> (closes: #562835) * debian/patches/sys-types-include.patch: fix pam_modutil.h so that it can be included directly, without having to include sys/types.h first. Closes: #556203. * Add postgresql-8.3 to the list of services in need of restart on upgrade. Closes: #563674. * And drop postgresql-{7.4,8.1} from the list, neither of which is present in stable. * debian/patches/007_modules_pam_unix: recognize that *all* of the password hashes other than traditional crypt handle passwords >8 chars in length. LP: #356766. -- Steve Langasek <vor...@debian.org> Mon, 01 Feb 2010 09:55:02 -0800 ** Changed in: pam (Ubuntu) Status: Triaged => Fix Released -- Changing long passwords causes spurious error https://bugs.launchpad.net/bugs/356766 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs