[Pkg-shadow-commits] r454 - in branches/experimental/debian: .
patches
Christian Perrier
bubulle at costa.debian.org
Wed Aug 17 08:30:20 UTC 2005
Author: bubulle
Date: 2005-08-17 08:30:19 +0000 (Wed, 17 Aug 2005)
New Revision: 454
Modified:
branches/experimental/debian/changelog
branches/experimental/debian/patches/421_login.1_pishing
Log:
Only patch the XML file
Modified: branches/experimental/debian/changelog
===================================================================
--- branches/experimental/debian/changelog 2005-08-17 08:29:17 UTC (rev 453)
+++ branches/experimental/debian/changelog 2005-08-17 08:30:19 UTC (rev 454)
@@ -6,7 +6,7 @@
* Debian packaging fixes:
- Fix a bug number in the previous changelog entry (s/155297/155279/).
- Patches for man pages reduced to only patch XML files:
- 441, 440, 333
+ 441, 440, 333, 421
- Reduce 005 patch to only patch useradd.8.xml (other changes
have been fixed upstream and we assume that the man pages are
generated from the XML files)
Modified: branches/experimental/debian/patches/421_login.1_pishing
===================================================================
--- branches/experimental/debian/patches/421_login.1_pishing 2005-08-17 08:29:17 UTC (rev 453)
+++ branches/experimental/debian/patches/421_login.1_pishing 2005-08-17 08:30:19 UTC (rev 454)
@@ -3,23 +3,6 @@
Status wrt upstream: Not applied
-Index: shadow-4.0.10/man/login.1
-===================================================================
---- shadow-4.0.10.orig/man/login.1 2005-07-07 02:54:12.000000000 +0200
-+++ shadow-4.0.10/man/login.1 2005-07-09 11:45:09.000000000 +0200
-@@ -103,6 +103,12 @@
- to clean up apparent ownership of a terminal session. If you use \fBlogin\fR
- from the shell prompt without \fBexec\fR, the user you use will
- continue to appear to be logged in even after you log out of the "subsession".
-+.PP
-+As any program, \fBlogin\fR appearance could be faked. If non-trusted users have a
-+physical access to the machine, an attacker could use this to obtain the
-+password of the next person sitting in front of the machine. Under Linux,
-+the SAK mecanism can be used by users to initiate of a trusted path and
-+prevent this kind of attack.
-
- .SH "FILES"
-
Index: shadow-4.0.10/man/login.1.xml
===================================================================
--- shadow-4.0.10.orig/man/login.1.xml 2005-07-07 02:54:12.000000000 +0200
More information about the Pkg-shadow-commits
mailing list