GNU bug report logs -
#75639
[PATCH] Update pam-u2f to 3.1.2
Previous Next
To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 75639 in the body.
You can then email your comments to 75639 AT debbugs.gnu.org in the normal way.
Toggle the display of automated, internal messages from the tracker.
Report forwarded
to
guix-patches <at> gnu.org
:
bug#75639
; Package
guix-patches
.
(Sat, 18 Jan 2025 03:27:02 GMT)
Full text and
rfc822 format available.
Acknowledgement sent
to
Lesik Edelweiss <lesikedelweiss <at> disroot.org>
:
New bug report received and forwarded. Copy sent to
guix-patches <at> gnu.org
.
(Sat, 18 Jan 2025 03:27:02 GMT)
Full text and
rfc822 format available.
Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):
This fixes the CVE-2025-23013
Change-Id: I4a7d37c25af38ff90bbae18adc0d4b145c7ad3c0
---
gnu/packages/security-token.scm | 32 +++++++++++++++-----------------
1 file changed, 15 insertions(+), 17 deletions(-)
diff --git a/gnu/packages/security-token.scm b/gnu/packages/security-token.scm
index cb6746c028..f04dab6909 100644
--- a/gnu/packages/security-token.scm
+++ b/gnu/packages/security-token.scm
@@ -682,25 +682,23 @@ (define-public libu2f-server
(define-public pam-u2f
(package
(name "pam-u2f")
- (version "1.3.0")
- (source (origin
- (method git-fetch)
- (uri
- (git-reference
- (url "https://github.com/Yubico/pam-u2f")
- (commit (string-append "pam_u2f-" version))))
- (file-name (git-file-name name version))
- (sha256
- (base32 "1swvys98mw7ailllgqicvhj315qajhvqrmm314cp3bj0l76s9qpv"))))
+ (version "1.3.2")
+ (source
+ (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url "https://github.com/Yubico/pam-u2f")
+ (commit (string-append "pam_u2f-" version))))
+ (file-name (git-file-name name version))
+ (sha256
+ (base32 "0528r0q3j1d6cb3dzh9vgagr8v2b2y5yylykr1cqjmg9hvp35a4i"))))
(build-system gnu-build-system)
(arguments
- `(#:configure-flags
- (list (string-append "--with-pam-dir="
- (assoc-ref %outputs "out") "/lib/security"))))
- (inputs
- (list libfido2 linux-pam openssl))
- (native-inputs
- (list asciidoc autoconf automake libtool pkg-config))
+ `(#:configure-flags (list (string-append "--with-pam-dir="
+ (assoc-ref %outputs "out")
+ "/lib/security"))))
+ (inputs (list libfido2 linux-pam openssl))
+ (native-inputs (list asciidoc autoconf automake libtool pkg-config))
(home-page "https://developers.yubico.com/pam-u2f/")
(synopsis "PAM module for U2F authentication")
(description
base-commit: f0804b0c2253542e9f0e255fbf8dc5847bba919d
--
2.47.1
Reply sent
to
Lesik Edelweiss <lesikedelweiss <at> disroot.org>
:
You have taken responsibility.
(Sat, 18 Jan 2025 04:13:02 GMT)
Full text and
rfc822 format available.
Notification sent
to
Lesik Edelweiss <lesikedelweiss <at> disroot.org>
:
bug acknowledged by developer.
(Sat, 18 Jan 2025 04:13:02 GMT)
Full text and
rfc822 format available.
Message #10 received at 75639-done <at> debbugs.gnu.org (full text, mbox):
Sorry, I accidentally opened two issues, as it's my first time using git send-email and submitting a patch to Guix.
Information forwarded
to
guix-patches <at> gnu.org
:
bug#75639
; Package
guix-patches
.
(Sat, 18 Jan 2025 14:30:03 GMT)
Full text and
rfc822 format available.
Message #13 received at 75639-done <at> debbugs.gnu.org (full text, mbox):
On Sat, 18 Jan 2025 06:33:46 +0800,
Lesik Edelweiss via Guix-patches via wrote:
>
> This fixes the CVE-2025-23013
>
> Change-Id: I4a7d37c25af38ff90bbae18adc0d4b145c7ad3c0
> ---
> gnu/packages/security-token.scm | 32 +++++++++++++++-----------------
> 1 file changed, 15 insertions(+), 17 deletions(-)
Applied as c029eb43b4ff553bc2fa77ddd07c5a78da5fd8c9, thanks!
bug archived.
Request was from
Debbugs Internal Request <help-debbugs <at> gnu.org>
to
internal_control <at> debbugs.gnu.org
.
(Sun, 16 Feb 2025 12:24:08 GMT)
Full text and
rfc822 format available.
This bug report was last modified 25 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.