Your message dated Wed, 22 Feb 2006 11:32:07 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#352494: fixed in shadow 1:4.0.14-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: passwd
Version: 1:4.0.14-5
Severity: normal

Hi,

invoking "passwd foo" in a chroot without /proc mounted results in the
error message "passwd: You may not view or modify password information
for foo".

Please have this changed to a little less misleading message.

Thanks to strace, I found the real cause for the problem pretty fast.

Greetings
Marc

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15.4-zgsrv
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)

Versions of packages passwd depends on:
ii  debianutils                   2.15.2     Miscellaneous utilities specific t
ii  libc6                         2.3.5-13   GNU C Library: Shared libraries an
ii  libpam-modules                0.79-3.1   Pluggable Authentication Modules f
ii  libpam0g                      0.79-3.1   Pluggable Authentication Modules l
ii  libselinux1                   1.28-4     SELinux shared libraries
ii  login                         1:4.0.14-5 system login tools

passwd recommends no packages.

-- debconf information excluded


--- End Message ---
--- Begin Message ---
Source: shadow
Source-Version: 1:4.0.14-7

We believe that the bug you reported is fixed in the latest version of
shadow, which is due to be installed in the Debian FTP archive:

login_4.0.14-7_i386.deb
  to pool/main/s/shadow/login_4.0.14-7_i386.deb
passwd_4.0.14-7_i386.deb
  to pool/main/s/shadow/passwd_4.0.14-7_i386.deb
shadow_4.0.14-7.diff.gz
  to pool/main/s/shadow/shadow_4.0.14-7.diff.gz
shadow_4.0.14-7.dsc
  to pool/main/s/shadow/shadow_4.0.14-7.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Perrier <[EMAIL PROTECTED]> (supplier of updated shadow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 22 Feb 2006 06:58:47 +0100
Source: shadow
Binary: login passwd
Architecture: source i386
Version: 1:4.0.14-7
Distribution: unstable
Urgency: low
Maintainer: Shadow package maintainers <[EMAIL PROTECTED]>
Changed-By: Christian Perrier <[EMAIL PROTECTED]>
Description: 
 login      - system login tools
 passwd     - change and administer password and group data
Closes: 333706 352494 353813
Changes: 
 shadow (1:4.0.14-7) unstable; urgency=low
 .
   * The "Carré d'Aurillac" release (let's stay in Cantal)
   * Upstream bugs or fixes not already fixed in upstream releases or CVS:
     - 467_useradd_-r_LSB: add a "-r" option for adding system users
       for LSB compatibility. Closes: #333706
     - 493_selinux_no_proc:
       Only check selinux_check_passwd_access on SELinux enabled system.
       This fix issues in passwd, chage, chfn and chsh when /proc is not
       mounted. Closes: #352494
   * Debian packaging fixes:
     - Stop replacing manpages-it (login only, newusers is still conflicting on
       passwd) and manpages-hu as new releases removed the conflicting manpages
     - passwd.config:
       Better POSIX compliance and avoid failure if root password is set to '!'
       Thanks to Vagrant Cascadian for reporting and providing the patch
       Closes: #353813
Files: 
 d1d4047820f2db31820c47b06805a132 1030 admin required shadow_4.0.14-7.dsc
 7136007b057731da3634a5568271f5ab 177515 admin required shadow_4.0.14-7.diff.gz
 82b17d748b0b50f28a54b68c3fe03c1f 730374 admin required passwd_4.0.14-7_i386.deb
 45f159325898f156ca6dadcb22ec8bf4 653292 admin required login_4.0.14-7_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFD/Lis1OXtrMAUPS0RAidaAJ9AppWsN4t11uyrEAsncEUS1iPNCgCfYhH/
PqOdgsprj7mTX9bKo/qq88I=
=ocPE
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to