[Pkg-auth-maintainers] Bug#979973: libpam-yubico: proposed patch to fix #979973

Jochen Hein jochen at jochen.org
Sun Feb 21 05:13:53 GMT 2021


Package: libpam-yubico
Followup-For: Bug #979973

Dear Maintainer,

I've upgraded one of my systems where I use pam_yubico and hit the problem.
I'd like to see the issue fixed for bullseye since it might have
security implications or might render people to be unable to login.

Please consider the attached patch to debian packaging.

Do we need to talk to the release team and/or raise the bug severity?

<#part type="text/x-diff" filename="~/work/GNU/libpam-yubico-fix-debian-bug-979973.diff" disposition=inline>
<#/part>

Thanks for considering.
Jochen

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-3-amd64 (SMP w/4 CPU threads)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libpam-yubico depends on:
ii  debconf [debconf-2.0]  1.5.74
ii  libc6                  2.31-9
ii  libldap-2.4-2          2.4.57+dfsg-2
ii  libpam-runtime         1.4.0-4
ii  libpam0g               1.4.0-4
ii  libykclient3           2.15-2+b1
ii  libykpers-1-1          1.20.0-3
ii  libyubikey0            1.13-6

libpam-yubico recommends no packages.

libpam-yubico suggests no packages.

-- debconf information:
  libpam-yubico/module_args: mode=client try_first_pass id=N key=K



More information about the Pkg-auth-maintainers mailing list