[ubuntu/jaunty] shadow 1:4.1.1-5ubuntu1 (Accepted)

Scott James Remnant scott at ubuntu.com
Wed Nov 5 07:30:14 GMT 2008


shadow (1:4.1.1-5ubuntu1) jaunty; urgency=low

  * Merge from debian unstable, remaining changes:
    - debian/login.pam: Enable SELinux support in login.pam.

shadow (1:4.1.1-5) unstable; urgency=low

  * The "Bergues" release.
  * debian/login.pam: restore the Etch behavior of pam_securetty.so in case of
    unknown user. Closes: #443322, #495831

shadow (1:4.1.1-4) unstable; urgency=low

  * The "Rocamadour" release.
  * debian/patches/302_remove_non_translated_polish_manpages,
    debian/patches/series: Remove the (untranslated) su.1 and login.1 polish
    translation.  Closes: #491460
  * debian/patches/506_relaxed_usernames: Document that the naming policy is
    also used for the group names policy. Differentiate the Debian
    constraints in a separate paragraph. Added documentation of the username
    length restriction. Closes: #493230
  * debian/patches/507_32char_grnames.dpatch: Update the documentation of the
    group length restriction. Closes: #493230
  * debian/login.pam: Replace the "multiple" option of pam_selinux by
    "select_context". This requires PAM 1.0.1, but is commented.
    Closes: #493181
  * debian/patches/494_passwd_lock-no_account_lock: Fix typo (missing
    parenthesis). Thanks to Moray Allan.

shadow (1:4.1.1-3) unstable; urgency=low

  * The "Morbier" release.
  * debian/patches/302_vim_selinux_support: Add SE Linux support to vipw/vigr.
    Thanks to Russell Coker. Closes: #491907
  * debian/patches/494_passwd_lock-no_account_lock: Restore the previous
    behavior of passwd -l (which changed in #389183): only lock the user's
    password, not the user's account. Also explicitly document the
    differences. This restores a behavior common with the previous versions of
    passwd and with other implementations. Closes: #492307
  * debian/patches/494_passwd_lock-no_account_lock: Add a reference to
    usermod(8) in passwd(1). Closes: #412234
  * debian/login.pam: Enforce a fail delay to avoid login brute-force.
    Closes: #443322
  * debian/login.pam: Indicate why the pam_securetty module is used as a
    requisite module and mentions the possible drawbacks. Closes: #482352
  * debian/login.defs: Do not mention the libpam-umask package (the module is
    now provided by libpam-modules). Closes: #492410
  * debian/patches/200_Czech_binary_translation: Updated Czech translation.
    Thanks to Miroslav Kure. Closes: #482823
  * debian/securetty.linux: Add the PA-RISC mux ports (ttyB0, ttyB1).
    Closes: #488515

shadow (1:4.1.1-2) unstable; urgency=low

  * The "Brie de Meaux" and "Brie de Melun" double cheese release.
  * Backported patches from upstream
    - debian/patches/300_SHA_crypt_method:
      This fixes bugs in the SHA encryption method that force the salt to have
      8 bytes (instead of a random length between 8 and 16 bytes), and force
      the number of SHA rounds to be equal to the lowest limit (at least 1000
      SHA rounds).
    - debian/patches/301_manpages_missing_options:
      This add the missing documentation of options in useradd, groupadd, and
      newusers.
  * Tag patches already applied upstream
    - debian/patches/487_passwd_chauthtok_failed_message
    - debian/patches/406_vipw_resume_properly
    - debian/patches/008_su_get_PAM_username
    - debian/patches/491_configure.in_friendly_selinux_detection
    - debian/patches/434_login_stop_checking_args_after--
    - debian/patches/414_remove-unwise-advices
  * Added description of new variables in /etc/login.defs:
    - SYS_UID_MIN, SYS_UID_MAX, SYS_GID_MIN, SYS_GID_MAX
    - ENCRYPT_METHOD
    - SHA_CRYPT_MIN_ROUNDS, SHA_CRYPT_MAX_ROUNDS
  * New Debian Policy:
    - debian/control: Bump Standards-Version to 3.8.0 (no changes needed).
    - debian/README.source: Document how to patch the upstream source, how to
      use quilt, how to package a new upstream and how to use the testsuite.
  * debian/patches/505_useradd_recommend_adduser: Fix typo: userdel is used to
    remove an user, not to add one. Closes: #475795

Date: Wed, 05 Nov 2008 07:26:43 +0000
Changed-By: Scott James Remnant <scott at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Scott James Remnant <scott at canonical.com>
https://launchpad.net/ubuntu/jaunty/+source/shadow/1:4.1.1-5ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 05 Nov 2008 07:26:43 +0000
Source: shadow
Binary: passwd login
Architecture: source
Version: 1:4.1.1-5ubuntu1
Distribution: jaunty
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Scott James Remnant <scott at ubuntu.com>
Description: 
 login      - system login tools
 passwd     - change and administer password and group data
Closes: 412234 443322 443322 475795 482352 482823 488515 491460 491907 492307 492410 493181 493230 493230 495831
Changes: 
 shadow (1:4.1.1-5ubuntu1) jaunty; urgency=low
 .
   * Merge from debian unstable, remaining changes:
     - debian/login.pam: Enable SELinux support in login.pam.
 .
 shadow (1:4.1.1-5) unstable; urgency=low
 .
   * The "Bergues" release.
   * debian/login.pam: restore the Etch behavior of pam_securetty.so in case of
     unknown user. Closes: #443322, #495831
 .
 shadow (1:4.1.1-4) unstable; urgency=low
 .
   * The "Rocamadour" release.
   * debian/patches/302_remove_non_translated_polish_manpages,
     debian/patches/series: Remove the (untranslated) su.1 and login.1 polish
     translation.  Closes: #491460
   * debian/patches/506_relaxed_usernames: Document that the naming policy is
     also used for the group names policy. Differentiate the Debian
     constraints in a separate paragraph. Added documentation of the username
     length restriction. Closes: #493230
   * debian/patches/507_32char_grnames.dpatch: Update the documentation of the
     group length restriction. Closes: #493230
   * debian/login.pam: Replace the "multiple" option of pam_selinux by
     "select_context". This requires PAM 1.0.1, but is commented.
     Closes: #493181
   * debian/patches/494_passwd_lock-no_account_lock: Fix typo (missing
     parenthesis). Thanks to Moray Allan.
 .
 shadow (1:4.1.1-3) unstable; urgency=low
 .
   * The "Morbier" release.
   * debian/patches/302_vim_selinux_support: Add SE Linux support to vipw/vigr.
     Thanks to Russell Coker. Closes: #491907
   * debian/patches/494_passwd_lock-no_account_lock: Restore the previous
     behavior of passwd -l (which changed in #389183): only lock the user's
     password, not the user's account. Also explicitly document the
     differences. This restores a behavior common with the previous versions of
     passwd and with other implementations. Closes: #492307
   * debian/patches/494_passwd_lock-no_account_lock: Add a reference to
     usermod(8) in passwd(1). Closes: #412234
   * debian/login.pam: Enforce a fail delay to avoid login brute-force.
     Closes: #443322
   * debian/login.pam: Indicate why the pam_securetty module is used as a
     requisite module and mentions the possible drawbacks. Closes: #482352
   * debian/login.defs: Do not mention the libpam-umask package (the module is
     now provided by libpam-modules). Closes: #492410
   * debian/patches/200_Czech_binary_translation: Updated Czech translation.
     Thanks to Miroslav Kure. Closes: #482823
   * debian/securetty.linux: Add the PA-RISC mux ports (ttyB0, ttyB1).
     Closes: #488515
 .
 shadow (1:4.1.1-2) unstable; urgency=low
 .
   * The "Brie de Meaux" and "Brie de Melun" double cheese release.
   * Backported patches from upstream
     - debian/patches/300_SHA_crypt_method:
       This fixes bugs in the SHA encryption method that force the salt to have
       8 bytes (instead of a random length between 8 and 16 bytes), and force
       the number of SHA rounds to be equal to the lowest limit (at least 1000
       SHA rounds).
     - debian/patches/301_manpages_missing_options:
       This add the missing documentation of options in useradd, groupadd, and
       newusers.
   * Tag patches already applied upstream
     - debian/patches/487_passwd_chauthtok_failed_message
     - debian/patches/406_vipw_resume_properly
     - debian/patches/008_su_get_PAM_username
     - debian/patches/491_configure.in_friendly_selinux_detection
     - debian/patches/434_login_stop_checking_args_after--
     - debian/patches/414_remove-unwise-advices
   * Added description of new variables in /etc/login.defs:
     - SYS_UID_MIN, SYS_UID_MAX, SYS_GID_MIN, SYS_GID_MAX
     - ENCRYPT_METHOD
     - SHA_CRYPT_MIN_ROUNDS, SHA_CRYPT_MAX_ROUNDS
   * New Debian Policy:
     - debian/control: Bump Standards-Version to 3.8.0 (no changes needed).
     - debian/README.source: Document how to patch the upstream source, how to
       use quilt, how to package a new upstream and how to use the testsuite.
   * debian/patches/505_useradd_recommend_adduser: Fix typo: userdel is used to
     remove an user, not to add one. Closes: #475795
Checksums-Sha1: 
 4e4dbf7d9683cf8fa65c49b7892f40d14bca0cf4 1654 shadow_4.1.1-5ubuntu1.dsc
 e30190a6467a4c730ea21b673e6da654d075a361 91420 shadow_4.1.1-5ubuntu1.diff.gz
Checksums-Sha256: 
 fe0fb025714cfd050a156ee13e9d518110287011a76356b7d83e0eeedde3889b 1654 shadow_4.1.1-5ubuntu1.dsc
 fcedd4a541c4745b0c1c589ea491261fbe549ecb595e16b970034f531eada262 91420 shadow_4.1.1-5ubuntu1.diff.gz
Files: 
 5fa8ce9629dd89d763a1ed5f98155a50 1654 admin required shadow_4.1.1-5ubuntu1.dsc
 bcfe65af5e0fb120b67e7045e8b5424f 91420 admin required shadow_4.1.1-5ubuntu1.diff.gz
Original-Maintainer: Shadow package maintainers <pkg-shadow-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkRSvcACgkQSnQiFMl4yK7XRQCgq72U5KtjXTWBGn2+AEsQXk8k
JTkAniUNCpQ8D3ZDIgBCuI1l6mE3Yart
=/0Jc
-----END PGP SIGNATURE-----


More information about the Jaunty-changes mailing list