[ubuntu/jaunty] shadow 1:4.1.1-5ubuntu1 (Accepted)
Scott James Remnant
scott at ubuntu.com
Wed Nov 5 07:30:14 GMT 2008
shadow (1:4.1.1-5ubuntu1) jaunty; urgency=low
* Merge from debian unstable, remaining changes:
- debian/login.pam: Enable SELinux support in login.pam.
shadow (1:4.1.1-5) unstable; urgency=low
* The "Bergues" release.
* debian/login.pam: restore the Etch behavior of pam_securetty.so in case of
unknown user. Closes: #443322, #495831
shadow (1:4.1.1-4) unstable; urgency=low
* The "Rocamadour" release.
* debian/patches/302_remove_non_translated_polish_manpages,
debian/patches/series: Remove the (untranslated) su.1 and login.1 polish
translation. Closes: #491460
* debian/patches/506_relaxed_usernames: Document that the naming policy is
also used for the group names policy. Differentiate the Debian
constraints in a separate paragraph. Added documentation of the username
length restriction. Closes: #493230
* debian/patches/507_32char_grnames.dpatch: Update the documentation of the
group length restriction. Closes: #493230
* debian/login.pam: Replace the "multiple" option of pam_selinux by
"select_context". This requires PAM 1.0.1, but is commented.
Closes: #493181
* debian/patches/494_passwd_lock-no_account_lock: Fix typo (missing
parenthesis). Thanks to Moray Allan.
shadow (1:4.1.1-3) unstable; urgency=low
* The "Morbier" release.
* debian/patches/302_vim_selinux_support: Add SE Linux support to vipw/vigr.
Thanks to Russell Coker. Closes: #491907
* debian/patches/494_passwd_lock-no_account_lock: Restore the previous
behavior of passwd -l (which changed in #389183): only lock the user's
password, not the user's account. Also explicitly document the
differences. This restores a behavior common with the previous versions of
passwd and with other implementations. Closes: #492307
* debian/patches/494_passwd_lock-no_account_lock: Add a reference to
usermod(8) in passwd(1). Closes: #412234
* debian/login.pam: Enforce a fail delay to avoid login brute-force.
Closes: #443322
* debian/login.pam: Indicate why the pam_securetty module is used as a
requisite module and mentions the possible drawbacks. Closes: #482352
* debian/login.defs: Do not mention the libpam-umask package (the module is
now provided by libpam-modules). Closes: #492410
* debian/patches/200_Czech_binary_translation: Updated Czech translation.
Thanks to Miroslav Kure. Closes: #482823
* debian/securetty.linux: Add the PA-RISC mux ports (ttyB0, ttyB1).
Closes: #488515
shadow (1:4.1.1-2) unstable; urgency=low
* The "Brie de Meaux" and "Brie de Melun" double cheese release.
* Backported patches from upstream
- debian/patches/300_SHA_crypt_method:
This fixes bugs in the SHA encryption method that force the salt to have
8 bytes (instead of a random length between 8 and 16 bytes), and force
the number of SHA rounds to be equal to the lowest limit (at least 1000
SHA rounds).
- debian/patches/301_manpages_missing_options:
This add the missing documentation of options in useradd, groupadd, and
newusers.
* Tag patches already applied upstream
- debian/patches/487_passwd_chauthtok_failed_message
- debian/patches/406_vipw_resume_properly
- debian/patches/008_su_get_PAM_username
- debian/patches/491_configure.in_friendly_selinux_detection
- debian/patches/434_login_stop_checking_args_after--
- debian/patches/414_remove-unwise-advices
* Added description of new variables in /etc/login.defs:
- SYS_UID_MIN, SYS_UID_MAX, SYS_GID_MIN, SYS_GID_MAX
- ENCRYPT_METHOD
- SHA_CRYPT_MIN_ROUNDS, SHA_CRYPT_MAX_ROUNDS
* New Debian Policy:
- debian/control: Bump Standards-Version to 3.8.0 (no changes needed).
- debian/README.source: Document how to patch the upstream source, how to
use quilt, how to package a new upstream and how to use the testsuite.
* debian/patches/505_useradd_recommend_adduser: Fix typo: userdel is used to
remove an user, not to add one. Closes: #475795
Date: Wed, 05 Nov 2008 07:26:43 +0000
Changed-By: Scott James Remnant <scott at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Scott James Remnant <scott at canonical.com>
https://launchpad.net/ubuntu/jaunty/+source/shadow/1:4.1.1-5ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 05 Nov 2008 07:26:43 +0000
Source: shadow
Binary: passwd login
Architecture: source
Version: 1:4.1.1-5ubuntu1
Distribution: jaunty
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Scott James Remnant <scott at ubuntu.com>
Description:
login - system login tools
passwd - change and administer password and group data
Closes: 412234 443322 443322 475795 482352 482823 488515 491460 491907 492307 492410 493181 493230 493230 495831
Changes:
shadow (1:4.1.1-5ubuntu1) jaunty; urgency=low
.
* Merge from debian unstable, remaining changes:
- debian/login.pam: Enable SELinux support in login.pam.
.
shadow (1:4.1.1-5) unstable; urgency=low
.
* The "Bergues" release.
* debian/login.pam: restore the Etch behavior of pam_securetty.so in case of
unknown user. Closes: #443322, #495831
.
shadow (1:4.1.1-4) unstable; urgency=low
.
* The "Rocamadour" release.
* debian/patches/302_remove_non_translated_polish_manpages,
debian/patches/series: Remove the (untranslated) su.1 and login.1 polish
translation. Closes: #491460
* debian/patches/506_relaxed_usernames: Document that the naming policy is
also used for the group names policy. Differentiate the Debian
constraints in a separate paragraph. Added documentation of the username
length restriction. Closes: #493230
* debian/patches/507_32char_grnames.dpatch: Update the documentation of the
group length restriction. Closes: #493230
* debian/login.pam: Replace the "multiple" option of pam_selinux by
"select_context". This requires PAM 1.0.1, but is commented.
Closes: #493181
* debian/patches/494_passwd_lock-no_account_lock: Fix typo (missing
parenthesis). Thanks to Moray Allan.
.
shadow (1:4.1.1-3) unstable; urgency=low
.
* The "Morbier" release.
* debian/patches/302_vim_selinux_support: Add SE Linux support to vipw/vigr.
Thanks to Russell Coker. Closes: #491907
* debian/patches/494_passwd_lock-no_account_lock: Restore the previous
behavior of passwd -l (which changed in #389183): only lock the user's
password, not the user's account. Also explicitly document the
differences. This restores a behavior common with the previous versions of
passwd and with other implementations. Closes: #492307
* debian/patches/494_passwd_lock-no_account_lock: Add a reference to
usermod(8) in passwd(1). Closes: #412234
* debian/login.pam: Enforce a fail delay to avoid login brute-force.
Closes: #443322
* debian/login.pam: Indicate why the pam_securetty module is used as a
requisite module and mentions the possible drawbacks. Closes: #482352
* debian/login.defs: Do not mention the libpam-umask package (the module is
now provided by libpam-modules). Closes: #492410
* debian/patches/200_Czech_binary_translation: Updated Czech translation.
Thanks to Miroslav Kure. Closes: #482823
* debian/securetty.linux: Add the PA-RISC mux ports (ttyB0, ttyB1).
Closes: #488515
.
shadow (1:4.1.1-2) unstable; urgency=low
.
* The "Brie de Meaux" and "Brie de Melun" double cheese release.
* Backported patches from upstream
- debian/patches/300_SHA_crypt_method:
This fixes bugs in the SHA encryption method that force the salt to have
8 bytes (instead of a random length between 8 and 16 bytes), and force
the number of SHA rounds to be equal to the lowest limit (at least 1000
SHA rounds).
- debian/patches/301_manpages_missing_options:
This add the missing documentation of options in useradd, groupadd, and
newusers.
* Tag patches already applied upstream
- debian/patches/487_passwd_chauthtok_failed_message
- debian/patches/406_vipw_resume_properly
- debian/patches/008_su_get_PAM_username
- debian/patches/491_configure.in_friendly_selinux_detection
- debian/patches/434_login_stop_checking_args_after--
- debian/patches/414_remove-unwise-advices
* Added description of new variables in /etc/login.defs:
- SYS_UID_MIN, SYS_UID_MAX, SYS_GID_MIN, SYS_GID_MAX
- ENCRYPT_METHOD
- SHA_CRYPT_MIN_ROUNDS, SHA_CRYPT_MAX_ROUNDS
* New Debian Policy:
- debian/control: Bump Standards-Version to 3.8.0 (no changes needed).
- debian/README.source: Document how to patch the upstream source, how to
use quilt, how to package a new upstream and how to use the testsuite.
* debian/patches/505_useradd_recommend_adduser: Fix typo: userdel is used to
remove an user, not to add one. Closes: #475795
Checksums-Sha1:
4e4dbf7d9683cf8fa65c49b7892f40d14bca0cf4 1654 shadow_4.1.1-5ubuntu1.dsc
e30190a6467a4c730ea21b673e6da654d075a361 91420 shadow_4.1.1-5ubuntu1.diff.gz
Checksums-Sha256:
fe0fb025714cfd050a156ee13e9d518110287011a76356b7d83e0eeedde3889b 1654 shadow_4.1.1-5ubuntu1.dsc
fcedd4a541c4745b0c1c589ea491261fbe549ecb595e16b970034f531eada262 91420 shadow_4.1.1-5ubuntu1.diff.gz
Files:
5fa8ce9629dd89d763a1ed5f98155a50 1654 admin required shadow_4.1.1-5ubuntu1.dsc
bcfe65af5e0fb120b67e7045e8b5424f 91420 admin required shadow_4.1.1-5ubuntu1.diff.gz
Original-Maintainer: Shadow package maintainers <pkg-shadow-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkkRSvcACgkQSnQiFMl4yK7XRQCgq72U5KtjXTWBGn2+AEsQXk8k
JTkAniUNCpQ8D3ZDIgBCuI1l6mE3Yart
=/0Jc
-----END PGP SIGNATURE-----
More information about the Jaunty-changes
mailing list