[Pkg-shadow-commits] r454 - in branches/experimental/debian: . patches

Christian Perrier bubulle at costa.debian.org
Wed Aug 17 08:30:20 UTC 2005


Author: bubulle
Date: 2005-08-17 08:30:19 +0000 (Wed, 17 Aug 2005)
New Revision: 454

Modified:
   branches/experimental/debian/changelog
   branches/experimental/debian/patches/421_login.1_pishing
Log:
Only patch the XML file


Modified: branches/experimental/debian/changelog
===================================================================
--- branches/experimental/debian/changelog	2005-08-17 08:29:17 UTC (rev 453)
+++ branches/experimental/debian/changelog	2005-08-17 08:30:19 UTC (rev 454)
@@ -6,7 +6,7 @@
   * Debian packaging fixes:
     - Fix a bug number in the previous changelog entry (s/155297/155279/).
     - Patches for man pages reduced to only patch XML files:
-      441, 440, 333
+      441, 440, 333, 421
     - Reduce 005 patch to only patch useradd.8.xml (other changes
       have been fixed upstream and we assume that the man pages are
       generated from the XML files)

Modified: branches/experimental/debian/patches/421_login.1_pishing
===================================================================
--- branches/experimental/debian/patches/421_login.1_pishing	2005-08-17 08:29:17 UTC (rev 453)
+++ branches/experimental/debian/patches/421_login.1_pishing	2005-08-17 08:30:19 UTC (rev 454)
@@ -3,23 +3,6 @@
 
 Status wrt upstream: Not applied
 
-Index: shadow-4.0.10/man/login.1
-===================================================================
---- shadow-4.0.10.orig/man/login.1	2005-07-07 02:54:12.000000000 +0200
-+++ shadow-4.0.10/man/login.1	2005-07-09 11:45:09.000000000 +0200
-@@ -103,6 +103,12 @@
- to clean up apparent ownership of a terminal session.  If you use \fBlogin\fR
- from the shell prompt without \fBexec\fR, the user you use will
- continue to appear to be logged in even after you log out of the "subsession".
-+.PP
-+As any program, \fBlogin\fR appearance could be faked. If non-trusted users have a
-+physical access to the machine, an attacker could use this to obtain the
-+password of the next person sitting in front of the machine. Under Linux,
-+the SAK mecanism can be used by users to initiate of a trusted path and
-+prevent this kind of attack.
- 
- .SH "FILES"
- 
 Index: shadow-4.0.10/man/login.1.xml
 ===================================================================
 --- shadow-4.0.10.orig/man/login.1.xml	2005-07-07 02:54:12.000000000 +0200




More information about the Pkg-shadow-commits mailing list