This bug was fixed in the package pam - 1.0.1-9ubuntu1

---------------
pam (1.0.1-9ubuntu1) jaunty; urgency=low

  * Merge from Debian unstable
  * Remaining changes:
    - debian/libpam-modules.postinst: Add PATH to /etc/environment if it's not
      present there or in /etc/security/pam_env.conf. (should send to Debian).
    - debian/libpam0g.postinst: only ask questions during update-manager when
      there are non-default services running.
    - debian/patches-applied/series: Ubuntu patches are as below ...
    - debian/patches-applied/ubuntu-fix_standard_types: Use standard u_int8_t
      type rather than __u8.
    - debian/patches-applied/ubuntu-no-error-if-missingok: add a new, magic
      module option 'missingok' which will suppress logging of errors by
      libpam if the module is not found.
    - debian/patches-applied/ubuntu-regression_fix_securetty: prompt for
      password on bad username.
    - debian/patches-applied/ubuntu-rlimit_nice_correction: Explicitly
      initialise RLIMIT_NICE rather than relying on the kernel limits.
    - debian/patches-applied/ubuntu-user_defined_environment: Look at
      ~/.pam_environment too, with the same format as
      /etc/security/pam_env.conf.  (Originally patch 100; converted to quilt.)
    - Change Vcs-Bzr to point at the Ubuntu branch.
    - debian/local/common-password, debian/pam-configs/unix: switch from
      "md5" to "sha512" as password crypt default.

pam (1.0.1-9) unstable; urgency=low

  * Move the pam module packages to section 'admin'.
  * 027_pam_limits_better_init_allow_explicit_root: defaults need to be
    declared as LIMITS_DEF_DEFAULT instead of LIMITS_DEF_ALL, otherwise
    global limits will fail to be applied.  LP: #314222.

pam (1.0.1-8) unstable; urgency=low

  * Updated debconf translations:
    - Bulgarian, thanks to Damyan Ivanov <d...@debian.org> (closes: #518121)
    - Spanish, thanks to Javier Fernandez-Sanguino Peña <j...@debian.org>
      (closes: #518214)
    - Swedish, thanks to Martin Bagge <brot...@bsnet.se> (closes: #518324)
    - Vietnamese, thanks to Clytie Siddall <cly...@riverland.net.au>
      (closes: #518329)
    - Japanese, thanks to Kenshi Muto <km...@debian.org> (closes: #518335)
    - Slovak, thanks to Ivan Masár <heli...@centrum.sk> (closes: #518341)
    - Czech, thanks to Miroslav Kure <ku...@debian.cz> (closes: #518992)
    - Portuguese, thanks to Américo Monteiro <a_monte...@netcabo.pt>
      (closes: #519204)
    - Galician, thanks to Marce Villarino <mvillar...@users.sourceforge.net>
      (closes: #519447)
    - Romanian, thanks to Eddy Petrișor <eddy.petri...@gmail.com>
      (closes: #520552)
  * 027_pam_limits_better_init_allow_explicit_root: set the RLIMIT_MEMLOCK
    limit correctly to match the kernel default, which is not RLIM_INFINITY.
    Closes: #472629.

 -- Steve Langasek <steve.langa...@ubuntu.com>   Fri, 20 Mar 2009
19:12:10 -0700

** Changed in: pam (Ubuntu Jaunty)
       Status: Fix Committed => Fix Released

-- 
setting core dump size to above 0 does not work in /etc/security/limits.conf
https://bugs.launchpad.net/bugs/314222
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to