Quoting Nicolas François ([EMAIL PROTECTED]):
Hello,
After #351631, shadow was compiled with SELinux support.
This unfortunately broke some shadow utilities (passwd, chfn, chage,
chsh) when /proc is not mounted (#352494).
This is caused by selinux_check_passwd_access(), which returns -1
Hello,
After #351631, shadow was compiled with SELinux support.
This unfortunately broke some shadow utilities (passwd, chfn, chage,
chsh) when /proc is not mounted (#352494).
This is caused by selinux_check_passwd_access(), which returns -1 when
/proc is not mounted.
Nobody in the shadow
Package: passwd
Version: 1:4.0.14-5
Severity: normal
Hi,
invoking passwd foo in a chroot without /proc mounted results in the
error message passwd: You may not view or modify password information
for foo.
Please have this changed to a little less misleading message.
Thanks to strace, I found
Hello,
On Sun, Feb 12, 2006 at 12:19:22PM +0100, Marc Haber wrote:
invoking passwd foo in a chroot without /proc mounted results in the
error message passwd: You may not view or modify password information
for foo.
This was caused by the call to selinux_check_passwd_access, which failed
Hello Russell,
Can you have a look at http://bugs.debian.org/352494
After enabling the SELinux support in passwd, passwd (and chage, chfn
and chfn) doesn't work anymore if /proc is not mounted.
I sent a patch, but I have no SELinux box (and I'm not confident in my
understanding of SELinux).
On Monday 13 February 2006 06:12, Nicolas François [EMAIL PROTECTED]
wrote:
Can you have a look at http://bugs.debian.org/352494
After enabling the SELinux support in passwd, passwd (and chage, chfn
and chfn) doesn't work anymore if /proc is not mounted.
I sent a patch, but I have no
Hi,
Thanks for your look at the patch.
On Mon, Feb 13, 2006 at 09:20:29AM +1100, Russell Coker wrote:
On Monday 13 February 2006 06:12, Nicolas François [EMAIL PROTECTED]
wrote:
The patch looks incorrect in terms of passwd.c and chage.c.
SE Linux is a second level of security, so all
7 matches
Mail list logo