On Sun, Aug 03, 2025 at 01:22:13PM +0200, Bastien Roucaries wrote:
Source: pam
Version: 1.7.0-5
Severity: grave
Justification: may breaks the whole system (loggin)
X-Debbugs-CC: team@release.debian.org
X-Debbugs-CC: Debian Security Team <security@debian.org>
Hi,
Following fix of CVE-2024-10041 pam now use /usr/sbin/unix_chkpwd inconditionnaly
If someone use apparmor login or user then login will fail, may be some time
latter due to expired password or other unix configuration
see https://bugzilla.opensuse.org/show_bug.cgi?id=1219139 https://salsa.debian.org/apparmor-team/apparmor/-/commit/243162ca2938b391724f547596787c7f77d1fc5f
I order to be in the safe side could you add Breaks: apparmor-profiles (<< 4.1.0-1~) or may be Pre-Depends:
apparmor need to be updated before pam.
I know it is late in the release cycle, but I just detected trying to debug stuff for pam.
Maybe postone
Should this be reassigned to src:apparmor instread then and marked
affecting src:pam?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (1 / 15) |
Uptime: | 155:49:47 |
Calls: | 10,384 |
Calls today: | 1 |
Files: | 14,056 |
Messages: | 6,416,464 |