Your message dated Mon, 05 Aug 2024 23:05:44 +0000
with message-id <[email protected]>
and subject line Bug#750752: fixed in shadow 1:4.16.0-4
has caused the Debian Bug report #750752,
regarding passwd: cppw destroys files if named passwd.new group.new or
shadow.new as source for the copy
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
750752: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750752
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: passwd
Version: 1:4.1.5.1-1ubuntu9
Severity: normal
Dear Maintainer,
* What led up to the situation?
trying to use passwd.new as an intermediary file for
cppw /etc/passwd.new
result is that passwd.new is removed and passwd is 0 bytes long.
The reason for this is that cppw does not use a tmpfile to create
the intermediary file but uses passwd.new (and similarly group.new and
shadow.new)
This effectively destroys the source file passwd.new I had created as source
file to be copied.
* What exactly did you do (or not do) that was effective (or
ineffective)?
renaming my source for the passwd replacement fixed it but it took a while and
searching through the source code of cppw to understand what was happening.
* What was the outcome of this action?
that solves my problem for now
* What outcome did you expect instead?
cppw should never accidentally destroy an existing file, it should use a real
tmpfile
as a side note the man page of cppw (and cpgr) are outdated.
The options are not all mentioned and cpgr will overwrite passwd
if you use it in the form
cpgr /etc/group.file
best regards
Ben Polman
-- System Information:
Debian Release: jessie/sid
APT prefers trusty-updates
APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500,
'trusty'), (100, 'trusty-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.13.0-27-generic (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages passwd depends on:
ii debianutils 4.4
ii libc6 2.19-0ubuntu6
ii libpam-modules 1.1.8-1ubuntu2
ii libpam0g 1.1.8-1ubuntu2
ii libselinux1 2.2.2-1ubuntu0.1
ii libsemanage1 2.2-1
passwd recommends no packages.
passwd suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: shadow
Source-Version: 1:4.16.0-4
Done: Chris Hofstaedtler <[email protected]>
We believe that the bug you reported is fixed in the latest version of
shadow, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chris Hofstaedtler <[email protected]> (supplier of updated shadow package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 06 Aug 2024 00:29:18 +0200
Source: shadow
Architecture: source
Version: 1:4.16.0-4
Distribution: unstable
Urgency: medium
Maintainer: Shadow package maintainers
<[email protected]>
Changed-By: Chris Hofstaedtler <[email protected]>
Closes: 750752
Changes:
shadow (1:4.16.0-4) unstable; urgency=medium
.
* Drop Debian-only cppw, cpgr tools (Closes: #750752)
* Stop patching login, not installed anymore
* Define LOGIN_NAME_MAX on HURD
* Remove libsystemd-dev Build-Depends.
Only necessary for login(1).
* Stop building programs we do not install
Checksums-Sha1:
9968640910bb3e2aad6503aa0c8c508fd9bb2d53 2614 shadow_4.16.0-4.dsc
576a25c037bd0e36d011d6feb1e2d6c993e2eea1 169620 shadow_4.16.0-4.debian.tar.xz
a6001b82aa8ec0e593bda428ea71b02d255fec6d 9080 shadow_4.16.0-4_arm64.buildinfo
Checksums-Sha256:
cbb20576e02bb4dedf10723243b33897f57cffb26c85d585882b6485dadeeead 2614
shadow_4.16.0-4.dsc
7bb1a604494dc9567be64fa50994b72fd51011af86095d566bd71832c4d98d36 169620
shadow_4.16.0-4.debian.tar.xz
347dbe1c8ff395decbe2a2c10dd6337596ca3824b91a915ee0ad3d1a17e394c7 9080
shadow_4.16.0-4_arm64.buildinfo
Files:
e1b4d70d779138b51ca4efcb0f47be36 2614 admin required shadow_4.16.0-4.dsc
ff6fe16b8128aba3c8ae62b023361052 169620 admin required
shadow_4.16.0-4.debian.tar.xz
b282c042d4a6ecfab34c4f714ca155b9 9080 admin required
shadow_4.16.0-4_arm64.buildinfo
-----BEGIN PGP SIGNATURE-----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=6kc5
-----END PGP SIGNATURE-----
pgp8SOuAQHgIz.pgp
Description: PGP signature
--- End Message ---
_______________________________________________
Pkg-shadow-devel mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-shadow-devel