aboutsummaryrefslogtreecommitdiffstats
path: root/english/security
diff options
context:
space:
mode:
authorThomas Lange <lange@debian.org>2023-12-26 19:01:51 +0100
committerThomas Lange <lange@debian.org>2023-12-26 19:01:51 +0100
commitacf0f61c8f85996b3eef74dbe4391c39157ad2e1 (patch)
tree334ec6b8f44a68357d54abab9b119ccb797db84f /english/security
parent625986a7568db997727513abf63317bf3a18bc67 (diff)
remove old page
Diffstat (limited to 'english/security')
-rw-r--r--english/security/pam-auth.wml33
1 files changed, 0 insertions, 33 deletions
diff --git a/english/security/pam-auth.wml b/english/security/pam-auth.wml
deleted file mode 100644
index 374bd94ad98..00000000000
--- a/english/security/pam-auth.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-#use wml::debian::template title="Details on PAM vulnerable configuration"
-
-<p>From versions 1.0.1-6 to 1.0.1-9, the pam-auth-update utility included in
-the <a href="https://packages.debian.org/libpam-runtime">libpam-runtime</a>
-package in Debian <em>testing</em> and <em>unstable</em> suffered from a bug
-whereby systems could be inadvertently configured to allow access with or
-without a correct password (<a
-href="https://bugs.debian.org/519927">#519927</a>). Although the majority of
-users will not have been affected by this bug, those that are affected should
-consider their machines to be compromised, particularly if those machines are
-configured to allow access from the Internet.</p>
-
-<p>Beginning with version 1.0.1-10, released on 7th August 2009, libpam-runtime
-no longer permits this incorrect configuration, and on upgrade will detect if
-your system was affected by this bug.</p>
-
-<p>If you were shown a message on upgrade directing
-you to this webpage, you should assume that your system has been
-compromised. Unless you are familiar with recovering from
-security failures, viruses, and malicious software <strong>you should
-re-install this system from scratch</strong> or obtain the services of
-a skilled system administrator. The
-<a href="$(HOME)/doc/manuals/securing-debian-howto/">securing-debian-howto</a>
-includes
-<a href="$(HOME)/doc/manuals/securing-debian-howto/ch-after-compromise">information
-on recovering from a system compromise</a>.</p>
-
-<p>The Debian project apologizes that previous versions of libpam-runtime did
-not detect and prevent this situation.</p>
-
-
-
-

© 2014-2024 Faster IT GmbH | imprint | privacy policy