OpenSSH built without PAM support still gets options.use_pam = 1 set in servconf.c. This causes code in other modules (e.g. auth.c) intended for non- PAM sshds to be bypassed. I noticed this while trying to determine why OpenSSH on Solaris 8 was not processing expiration dates in /etc/shadow, despite code in auth.c:allowed_user () intended to do this. This has some security impact as it causes sshd to permit user logins that would be prohibited by /bin/login. Followup to bug #647 refers to the this setting of use_pam.
This has been fixed in 3.7.1p2: UsePAM now defaults to no, including when built without PAM support.
Should have closed this earlier: is fixed in 3.7.1p2.
Mass change of RESOLVED bugs to CLOSED