On Sat, Mar 30, 2024 at 01:41:40AM +0100, Chris Hofstaedtler wrote:
> Hi OpenSSH, shadow Maintainers,
>
> On Sat, Mar 30, 2024 at 01:32:08AM +0100, Chris Hofstaedtler wrote:
> > On Fri, Mar 29, 2024 at 06:02:39PM +0100, Sven Joachim wrote:
> > > It seems desirable to ship liblastlog2 in trixie,
Thanks. This is new to me - I see that debian/rules sets that as the
default.
Note that vipw will not use sensible-editor, or ask you what you want
for it, if VISUAL or EDITOR is set in your environment. Would you
mind adding that to your manpage patch?
thanks,
-serge
On Wed, Feb 28, 2024 at
Hi,
fwiw this looks good to me.
thanks,
-serge
On Wed, Jan 03, 2024 at 02:59:32PM +0100, Helmut Grohne wrote:
> Source: shadow
> Version: 1:4.13+dfsg1-3
> Tags: patch
> User: helm...@debian.org
> Usertags: dep17m2
>
> Hi,
>
> We want to finalize the /usr-merge transition via DEP17 by moving
On Thu, Jul 20, 2023 at 05:10:14PM +, ircu...@gmail.com wrote:
> Package: login
> Version: 1:4.13+dfsg1-1+b1
> Severity: serious
> X-Debbugs-Cc: ircu...@gmail.com
>
> Dear Maintainer,
>
> On a newly installed debian bookworm /usr/share/doc/passwd/NEWS.Debian.gz
> mentions a new
On Thu, Jun 22, 2023 at 08:13:24AM +0200, Marc Haber wrote:
> Package: login
> Version: 1:4.13+dfsg1-1+b1
> Severity: minor
>
> Hi,
>
> upgrading from bullseye to bookworm, during the "apt upgrade" step, it
> may happen that login updates login.defs and adds the NONEXISTENT and
> PREVENT_NO_AUTH
On Thu, May 11, 2023 at 09:48:27AM +0200, bu...@no-log.org wrote:
> Package: shadow
> Version: N/A
> Severity: wishlist
> Tags: patch l10n
>
> Dear Maintainer,
>
> Please find attached the french updated translation of shadow-man-page,
> proofread by the debian-l10n-french mailing list
On Mon, Mar 06, 2023 at 08:41:15PM +0100, Bálint Réczey wrote:
> Hi Alejandro,
>
>
> Alejandro Colomar ezt írta (időpont: 2023.
> márc. 5., V, 20:38):
> >
> > Package: passwd
> > Source: shadow
> > Tags: patch
> > X-Debbugs-CC: Bálint Réczey
> > X-Debbugs-CC: Iker Pedrosa
> > X-Debbugs-CC:
On Fri, Dec 16, 2022 at 04:14:56PM +0300, Michael Tokarev wrote:
> On Fri, 16 Dec 2022 11:50:18 + debian user wrote:
> > Package: login
> > Version: 1:4.13+dfsg1-1
> > Severity: grave
> > Tags: security
> > Justification: user security hole
> > X-Debbugs-Cc: r...@localhost.lan, Debian
On Fri, Oct 14, 2022 at 12:18:26AM +0200, Najib B wrote:
> Package: passwd
> Version: 1:4.12.3+dfsg1-1
> Severity: important
> X-Debbugs-Cc: najibbak...@gmail.com
>
> Dear Maintainer,
>
> I have just noticed this issue on chsh that I would like to report to you,
> including a solution that I
On Sat, Apr 09, 2022 at 06:41:47PM +0200, Christoph Anton Mitterer wrote:
> On Sat, 2022-04-09 at 08:20 -0500, Serge E. Hallyn wrote:
> > I wonder whether it was disabled
> > for security reasons? Is there a debian bug referring to that?
>
> Hmm could be this...
>
>
So deluser was doing the right thing, right?
The bug is how you got into this state? Either the adduser for
the high uid should have checked for it being a delegated subuid,
or the adduser which added the subuids to the lower subuid should
have refused when the higher subuid existed as a uid.
you did no
> comment on and used the suggustions you made.
>
> Attached the respective xml and diff files.
>
> Best regards
> Markus
>
> ------------
>
> "Serge E. Hallyn" schrieb am 20. Febru
Thank you, applied.
On Wed, Feb 23, 2022 at 10:02:12AM +0100, Markus Hiereth wrote:
> Hi Serge,
>
> On Mon, 21 Feb 2022 10:30:17 -0600 serge wrote:
>
> attached groups.1.xml and id.1.xml and patches that replace the
> previously sent on 21 Feb 2022 17:01:53 +0100.
>
> > Changing 'support' to
Thank you, this was already addressed by:
https://github.com/shadow-maint/shadow/commit/726abe8a3260984ead9c2d57e0e5564584dc9f8f
I must have accidentally git-add'd this change from you, which you had
originally sent Dec 22, into my fix for
https://github.com/shadow-maint/shadow/issues/500 ,
Thank you. I will take these diffs (4 I believe?), do one final review, and
push to github.com/shadow-maint/shadow under commits with you as Author.
On Mon, Feb 21, 2022 at 12:40:07PM +0100, Markus Hiereth wrote:
> Source: shadow
> Version: 4.8.1
> Severity: minor
>
> Dear Serge,
>
> in
On Fri, Feb 11, 2022 at 07:14:27PM +0100, Markus Hiereth wrote:
> Hi Serge,
>
> "Serge E. Hallyn" schrieb am 11. Februar 2022 um 18:13
>
> > Thanks. The diff is especially helpful. Although a few of these hunks
> > appear to be just changes to the line b
On Wed, Feb 09, 2022 at 11:18:04PM +0100, Markus Hiereth wrote:
> Source: shadow
> Version: 4.8.1
> Severity: normal
>
> Dear Serge,
>
> attached to this bugreport the improved file useradd.8.xml and a diff.
> A last check is certainly reasonable.
Thanks. The diff is especially helpful.
On Fri, Jan 28, 2022 at 12:26:00PM +0100, Markus Hiereth wrote:
> Dear Maintainer,
>
> the previously reported p
> roblem is quite probable due to fact that the setup instruction on groupmems
> hadn't be performs.
Ah, I see, manpage recommends setgid. The instructions in
the manpage are
On Fri, Jan 28, 2022 at 11:29:49AM +0100, Markus Hiereth wrote:
> Package: passwd
> Version: 1:4.8.1-1
> Severity: normal
>
> Dear Maintainer,
>
>
>* What led up to the situation?
>
> Checks made for translation of man 8 groupmems
>
>* What exactly did you do (or not do) that was
On Fri, Sep 24, 2021 at 08:13:22AM +0200, Johannes Schauer Marin Rodrigues
wrote:
> Hi Balint & Serge,
>
> Quoting Johannes Schauer Marin Rodrigues (2021-08-20 14:45:14)
> > For your convenience, I created a salsa MR that fixes #989712 as well as
> > #992578:
> >
> >
On Sat, Jun 26, 2021 at 05:57:02PM +0200, Christoph Anton Mitterer wrote:
> Source: shadow
> Version: 1:4.8.1-1
> Severity: normal
>
>
> Hey there.
>
>
> I've recently noted that some of my systems had entries like
>
> $ cat /etc/subuid
> debian-security-support:10:65536
>
On Sun, Sep 06, 2020 at 12:20:24AM +0200, Chris Hofstaedtler wrote:
> * Serge E. Hallyn [200905 22:19]:
> > On Mon, May 01, 2017 at 04:47:17PM +0200, Michael Biebl wrote:
> > > On Tue, 16 Aug 2016 15:26:46 -0500 "Serge E. Hallyn"
> > > wrote:
> > Fo
On Sun, Sep 06, 2020 at 12:20:24AM +0200, Chris Hofstaedtler wrote:
> * Serge E. Hallyn [200905 22:19]:
> > On Mon, May 01, 2017 at 04:47:17PM +0200, Michael Biebl wrote:
> > > On Tue, 16 Aug 2016 15:26:46 -0500 "Serge E. Hallyn"
> > > wrote:
> > Fo
On Sat, Nov 30, 2019 at 06:47:28PM +0100, Christian Göttsche wrote:
> As the change got merged upstream [1], and upstream releases roughly
> once a year, any chance this gets cherry-picked in the next Debian
Digs aside, the goal is 4x/year, and the next one is scheduled for December.
I was
Yes, I'd actually like to have a make option to run the tests in a
container, but I also had some trouble running the tests. Need a
"known to fail" option per test might be a good way to get moving
on this. Please keep me in the loop if/as you work on this.
On Mon, Nov 11, 2019 at 04:36:32PM
Thanks,
second option sounds nicer but sure is a lot more code. So I'm
leaning towards the first. Do you mind creating a github issue
at github.com/shadow-maint/shadow for this, or would you prefer that
I do it?
-serge
On Sat, Oct 19, 2019 at 04:20:11PM -0600, Todd C. Miller wrote:
>
Thanks. If you feel so inclined, please feel free to file an issue for it
at github.com/shadow-maint/shadow. I'll aim to fix this in the next week
or two. (A lot of travel coming up)
On Mon, Sep 23, 2019 at 01:16:10PM +0200, Laurent Bigonville wrote:
> Source: shadow
> Version: 1:4.7-2
>
On Tue, Apr 16, 2019 at 10:44:21PM +, Dmitry Bogatov wrote:
>
> [2019-04-14 13:35] Cristian Ionescu-Idbohrn
>
> > On Sun, 14 Apr 2019, Dmitry Bogatov wrote:
> > >
> > > Definitely. But default one is from bin:util-linux.
> >
> > On my sid/unstable:
> >
> > # dpkg -S /bin/login
> > login:
Hi,
it would be great if you could open a pull request at
https://github.com/shadow-maint/shadow/
Would you mind opening an issue (well, two) at
github.com/shadow-maint/shadow/issues?
I'll see it there when looking for a task, but am not likely to see this email.
Quoting 積丹尼 Dan Jacobson (jida...@jidanni.org):
> Package: passwd
> Version: 1:4.5-1
> Severity: wishlist
> File:
On Sat, Jul 15, 2017 at 11:42:22AM +0200, Frans Spiesschaert wrote:
> Serge E. Hallyn schreef op vr 14-07-2017 om 14:06 [-0500]:
> > Thanks, I see it went through some review at
> >
> > https://lists.debian.org/debian-l10n-dutch/2017/06/msg00055.html
> >
> > so
Thanks, I see it went through some review at
https://lists.debian.org/debian-l10n-dutch/2017/06/msg00055.html
so happy to take it in the upstream package. Would you like to
post a pull request at github.com/shadow-maint/shadow, or would
you prefer that I post the file for you?
On Tue, Apr 11, 2017 at 03:35:54PM +0200, Svenja Otten wrote:
> Am Wed, 5 Apr 2017 08:51:09 -0500
> schrieb "Serge E. Hallyn" <se...@hallyn.com>:
>
> > My guess would be that your new login is in a different cgroup from the
> > old. The path 'user.slice
On Mon, May 01, 2017 at 04:47:17PM +0200, Michael Biebl wrote:
> On Tue, 16 Aug 2016 15:26:46 -0500 "Serge E. Hallyn" <se...@hallyn.com>
> wrote:
> > Package: wnpp
> > Severity: normal
> >
> > I'd like to pass cgmanager along to a new maintainer,
Package: edbrowse
Version: 3.6.3
Please package the new version (3.6.3) of edbrowse.
It has some great new features like caching of http files, and M
without a destination buffer.
thanks,
Serge
Quoting Chris Lamb (la...@debian.org):
> Hi Serge,
>
> > > > looks ok to me, although, would it be better to fall back to time(NULL)
> > > > if the env variable is invalid?
> > >
> > > In my experience it is far superior to explicitly error out in this
> > > situation.
> >
> > My concern is
On Sun, Apr 09, 2017 at 10:07:38AM +0100, Chris Lamb wrote:
> Serge E. Hallyn wrote:
>
> > looks ok to me, although, would it be better to fall back to time(NULL)
> > if the env variable is invalid?
>
> In my experience it is far superior to explicitly error out in this
Quoting Chris Lamb (la...@debian.org):
> Package: shadow
> Severity: wishlist
> Version: 1:4.4-4
> Tags: patch
> User: reproducible-bui...@lists.alioth.debian.org
> Usertags: toolchain
> X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org
>
> Hi,
>
> Attached is the following:
>
> commit
Quoting Svenja Otten (ot...@global-village.de):
> Package: cgmanager
> Version: 0.33-2+deb8u2
>
> Hi,
>
> the "cgm gettasks" command does not always work as expected.
> I set up a memory limit of 64MB for the user with uid 1000:
>
> root@debian-test:~# cat
On Tue, Mar 28, 2017 at 06:45:34AM -0400, Stiepan wrote:
> Thanks to the 2.0.7-2 update by Evgeni Golov and his crystal-clear
> instructions on how to use lxcbr0 with this version, I could confirm that the
> issue with the host's routing table being affected by changes in the
> containers'
That is surprising, as it's fixed upstream by commit
efbff6a3d9df076da17568c7b5c4787e8fdd3f1c from Nov 9 2016.
On Sun, Jan 22, 2017 at 04:18:29PM +0100, Andreas Henriksson wrote:
> Hello again,
>
> Only focusing on su for this mail, have now studied the previously
> spotted differences between util-linux and shadow in more detail...
>
> TL;DR NEWS.Debian entry and ignoring the difference is probably
Hi,
so it looks like things which are duplicated include:
chfn
chsh
(but not chpasswd?)
newgroup
su
vipw
Do these all work the same way? (looks like util-linux su has a lot more
options and implements the options shadow's does, good, but it does not honor
all the same login.defs variables?)
in fairness the manpage does say:
-l, --login NEW_LOGIN
The name of the user will be changed from LOGIN to NEW_LOGIN.
Nothing else is
changed. In particular, the user's home directory or mail spool
should probably
be renamed manually to reflect the new
Quoting Johannes Schauer (jo...@debian.org):
> Package: lxc
> Version: 1:2.0.5-1
> Severity: wishlist
> Tags: patch
>
> Hi,
>
> with this bug I want to propose a patch against the lxc source package
> which splits out the lxc-unshare and lxc-usernsexec utilities into their
> own binary package.
Package: wnpp
Severity: normal
netcf is a library used to modify a host's network configuration. It is
used for example by the libvirt daemon.
The package should currently be uptodate and has been very low
maintenance, I just fear that as I'm not actively using or watching it
right now I'll let
Thank you ver much. Please go ahead and upload.
Quoting Mattia Rizzolo (mat...@debian.org):
> On Sun, Sep 04, 2016 at 01:16:54PM +, Matthias Klose wrote:
> > This package builds using the hardening-wrapper package, which
> > is now replaced by dpkg-dev's DEB_BUILD_MAINT_OPTIONS settings.
> >
> > Please consider dropping the build
Package: wnpp
Severity: normal
I'd like to pass cgmanager along to a new maintainer, if anyone has
an interest in keeping it up. Upstream (mainly myself) is essentially
no longer active, as its use has been supplanted by lxcfs.
If noone has need of it, then perhaps removing it will be the
Thanks, indeed those should be in sync. I believe the best is to change
the documentation to read the larger value, as it is a useful range for
containers to use. I'll aim to get that fix into the next release.
Thanks for reporting this bug. I personally think the best answer
is to change the manpage to specify 65536, as that's the most useful
range for containers. I'm however not a pkg maintainer, so this is
only my suggestion.
That sounds like an anti-feature, as anyone looking over
your shoulder knows the number of characters.
Sounds sensible to me. It also would be a worthwhile endeaver to
put up a blog post summarizing what user/passwords exist in all
the supported templates by default, and what options each provides
to customize that, and then having linuxcontainers.org point to
that blog post.
You wouldn't need to
A package with the fix is uploaded to
https://mentors.debian.net/debian/pool/main/e/edbrowse/edbrowse_3.6.0.1-2.dsc
On Tue, Jun 21, 2016 at 11:42:25AM +0200, Mònica Ramírez Arceda wrote:
> Hi,
>
> I can confirm this bug. Using a file with 5 new users I get the
> following error:
>
> # newusers 5users.csv
> *** Error in `newusers': double free or corruption (!prev):
> 0x01ae2d10 ***
> Aborted
Could
On Mon, Jun 06, 2016 at 01:49:39AM +0200, Steinar H. Gunderson wrote:
> On Mon, May 16, 2016 at 03:01:59PM +, Serge Hallyn wrote:
> > Seems reasonable to me.
>
> I see there hasn't been a maintainer upload of shadow since November 2014
> (there was an NMU November 2015). Does this mean that
Package: edbrowse
Version: 3.6.0.1-1
Hi,
there is a bug in the edbrowse package, which is fixed upstream by commit
543e667e3: Fix a possible NULL pointer dereference. It's trivially
reproducible by doing
rl
ctrl-d
A new package which builds, installs, and runs on debian unstable
is under http://people.canonical.com/~serge/netcf. It will do the
ncftool commands 'list', 'ifdown', and 'ifup'. The 'define' command
claims to succeed, but doesn't actually appear to do anything.
--
To UNSUBSCRIBE, email to
Hi,
Daniel Berrange: thanks very much.
I've started a package for Ubuntu and posted it here:
http://people.canonical.com/~serge/netcf-0.1.9-package.tar.gz
I'll spend some time test-building in debian Unstable, but haven't
done so yet. If someone else wants to take it and run with it,
by all
Package: xinetd
Version: 1:2.3.14-7
At https://bugs.launchpad.net/ubuntu/+source/xinetd/+bug/868538, Ulli
Horlacher reports:
I have an Ubuntu LXC host with several containers running internet
services via xinetd.
Sometimes the container services die without any reason and no logfile
entry.
Package: libvirt
Version: 0.9.6-1
libvirt ships with a libvirtd.8 man page (daemon/libvirtd.8.in), but
the package is not installing that. A possible debdiff is below, though
I assume that, in addition, '@sysconfdir@' and '@localstatedir@' should
be switched out?
thanks,
-serge
diff -Nru
Package: libcap2
Version: 1:2.21-1
Setting capabilies on large files on i386 fails. A fix for
this has been pushed to the upstream libcap git tree, with no
new version number. Could this fix be pulled into the debian
package?
The relevant Ubuntu bug is
Package: ipsec-tools
Version: 1:0.8.0-3.1
Hi,
gcc has changed its behavior so that it now returns error when it sees
unknown flags. configure was passing -R to gcc at times and counting
on this behavior to ignore -R. Now it must pass -Wl,-R. With this
debdiff, ipsec-tools compiles for me in
Package: ipsec-tools
Version: 1:0.8.0-3
Ubuntu patches setkey.init and racoon.init to use the lsb functions, as
below. Could these patches be applied in the debian package?
thanks,
-serge
diff -Nru ipsec-tools-0.8.0/debian/ipsec-tools.setkey.init
Package: lxc
Severity: wishlist
Hi,
please update to 0.7.4 or 0.7.4.2. A package based on 0.7.4.2 is at
http://people.canonical.com/~serge/lxc_0.7.4.2-1-package.tar.gz
thanks,
-serge
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe.
Hi,
to reduce the chances of conflicting parallel efforts, is anyone
currently privately working on implementing the needed support?
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
The following debdiff fixes it for me:
diff -Nru libcap2-2.20/debian/changelog libcap2-2.20/debian/changelog
--- libcap2-2.20/debian/changelog 2011-02-11 13:40:48.0 -0600
+++ libcap2-2.20/debian/changelog 2011-05-10 10:21:37.0 -0500
@@ -1,3 +1,10 @@
+libcap2
The fix for bug 591410 appears to be have been dropped from
libcap2 1:2.20-1, which gives me:
May 8 22:51:08 debian authdaemond: PAM unable to
dlopen(/lib/security/pam_cap.so): /lib/security/pam_cap.so: undefined symbol:
pam_get_item
May 8 22:51:08 debian authdaemond: PAM adding faulty
Package: resolvconf
Version: 1.47
The bind9 package uses /var/run/named, but the resolvconf
package thinks it uses /var/run/bind. Below is a trivial
debdiff to hopefully fix this.
diff -Nru resolvconf-1.47/debian/changelog
resolvconf-1.47fixbind/debian/changelog
---
Here is a patch (against the ubuntu package, just as example)
which instead of doing a dumb retry loop, waits for udev.
=== modified file 'debian/changelog'
--- debian/changelog2010-04-26 15:17:47 +
+++ debian/changelog2010-12-08 21:44:32 +
@@ -1,3 +1,15 @@
+initramfs-tools
Package: initramfs-tools
Version: 0.98
When using multipath, it is possible that mountroot() will race with
udev's renaming of /dev/disk/by-uuid/{rootfs-uuid} from /dev/sd?? to
/dev/mapper/something. After multipath has grabbed the /dev/sd?? and
until udev completes the rename, mounting
71 matches
Mail list logo