1.157. shadow-utils


1.157.1. RHBA-2011:0823: shadow-utils bug fix update

An updated shadow-utils package that fixes three bugs is now available for Red Hat Enterprise Linux 5.
The shadow-utils package includes programs for converting UNIX password files to the shadow password format, as well as tools for managing user and group accounts.
This update fixes the following bugs:
* When a new user is created, the content of the /etc/skel/ directory is copied to the user's home directory. Previously, an attempt to copy these files and directories from a file system with the support for access control lists (ACLs) enabled to a file system with ACLs disabled failed with an error, and some files were not copied. With this update, a patch has been applied to address this issue, and when a new user is created, the content of the /etc/skel/ directory is now successfully copied without an error. (BZ#690829)
* Due to incorrect handling of large user and group identifiers (that is, UIDs and GIDs) on 32-bit systems, the pwconv and pwunconv utilities changed all identifiers greater than 2147483647 to this value. With this update, the underlying source code has been adapted to ensure the pwconv and pwunconv utilities no longer alter the GIDs and UIDs. (BZ#690830)
* Previously, the faillog utility executed command line options as they were passed instead of parsing all options first. This update applies a patch that corrects the utility to parse all command line options before executing the commands. (BZ#690831)
All users of shadow-utils are advised to upgrade to this updated package, which fixes these bugs.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.