Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

1.157. shadow-utils


1.157.1. RHBA-2011:0823: shadow-utils bug fix update

An updated shadow-utils package that fixes three bugs is now available for Red Hat Enterprise Linux 5.
The shadow-utils package includes programs for converting UNIX password files to the shadow password format, as well as tools for managing user and group accounts.
This update fixes the following bugs:
* When a new user is created, the content of the /etc/skel/ directory is copied to the user's home directory. Previously, an attempt to copy these files and directories from a file system with the support for access control lists (ACLs) enabled to a file system with ACLs disabled failed with an error, and some files were not copied. With this update, a patch has been applied to address this issue, and when a new user is created, the content of the /etc/skel/ directory is now successfully copied without an error. (BZ#690829)
* Due to incorrect handling of large user and group identifiers (that is, UIDs and GIDs) on 32-bit systems, the pwconv and pwunconv utilities changed all identifiers greater than 2147483647 to this value. With this update, the underlying source code has been adapted to ensure the pwconv and pwunconv utilities no longer alter the GIDs and UIDs. (BZ#690830)
* Previously, the faillog utility executed command line options as they were passed instead of parsing all options first. This update applies a patch that corrects the utility to parse all command line options before executing the commands. (BZ#690831)
All users of shadow-utils are advised to upgrade to this updated package, which fixes these bugs.
Red Hat logoGithubRedditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

© 2024 Red Hat, Inc.