Este contenido no está disponible en el idioma seleccionado.

4.161. shadow-utils


Updated shadow-utils packages that fix a bug in pwconv are now available for Red Hat Enterprise Linux 5.
The shadow-utils package includes the necessary programs for converting UNIX password files to the shadow password format, plus programs for managing user and group accounts. The pwconv command converts passwords to the shadow password format. The pwunconv command converts shadow passwords and generates an npasswd file (a standard UNIX password file). The pwck command checks the integrity of password and shadow files. The lastlog command prints out the last login times for all users. The useradd, userdel, and usermod commands are used for managing user accounts. The groupadd, groupdel, and groupmod commands are used for managing group accounts.

Bug Fix

BZ#787736
A structural bug in a delete routine meant /etc/shadow (or /etc/gshadow) files containing bad entries were not updated properly by pwconv (or grpconv). Specifically if /etc/shadow (or /etc/gshadow) contained two consecutive bad entries, the second of the two bad entries was skipped when pwconv (or grpconv) was run on the file. This left the file improperly updated. With this update, the loop that iterates through /etc/shadow (or /etc/gshadow) was reworked. No bad lines (consecutive or otherwise) are now skipped and /etc/shadow (or /etc/gshadow) files are properly updated by pwconv (or grpconv).
All shadow-utils users should install this update which fixes this bug.
Red Hat logoGithubRedditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

© 2024 Red Hat, Inc.