[Pkg-shadow-devel] Bug#302740: marked as done ([POST-SARGE] 'man passwd' typo: "compatiblity")

Debian Bug Tracking System owner@bugs.debian.org
Sun, 08 May 2005 13:03:10 -0700


Your message dated Sun, 08 May 2005 15:49:21 -0400
with message-id <E1DUrmD-00075N-00@newraff.debian.org>
and subject line Bug#302740: fixed in shadow 1:4.0.3-33
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 2 Apr 2005 18:07:27 +0000
>From agcosta@gis.net Sat Apr 02 10:07:27 2005
Return-path: <agcosta@gis.net>
Received: from mx05.gis.net [208.218.130.13] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DHn1q-0005pY-00; Sat, 02 Apr 2005 10:07:26 -0800
Received: from arf ([207.7.201.243]) by mx05.gis.net; Sat, 02 Apr 2005 13:07:24 -0500
Received: from alfie by Arf with local (Exim 3.36 #1 (Debian))
	id 1DHn2I-0002cj-00; Sat, 02 Apr 2005 13:07:54 -0500
Content-Type: multipart/mixed; boundary="===============0901093174=="
MIME-Version: 1.0
From: A Costa <agcosta@gis.net>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: 'man passwd' typo: "compatiblity"
X-Mailer: reportbug 3.9
Date: Sat, 02 Apr 2005 13:07:50 -0500
Message-Id: <E1DHn2I-0002cj-00@Arf>
Sender: A Costa <alfie@Arf>
X-BadReturnPath: alfie@Arf rewritten as agcosta@gis.net
  using "From" header
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

This is a multi-part MIME message sent by reportbug.

--===============0901093174==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Package: passwd
Version: 1:4.0.3-31sarge1
Severity: minor
Tags: patch


Found a typo in '/usr/share/man/man1/passwd.1.gz', see attached '.diff'.

Hope this helps...

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.9-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)

Versions of packages passwd depends on:
ii  libc6                   2.3.2.ds1-20     GNU C Library: Shared libraries an
ii  libpam-modules          0.76-22          Pluggable Authentication Modules f
ii  libpam0g                0.76-22          Pluggable Authentication Modules l
ii  login                   1:4.0.3-31sarge1 system login tools

-- debconf information excluded

--===============0901093174==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="passwd.1.diff"

50c50
< information.  These two options are only meant for compatiblity, since the
---
> information.  These two options are only meant for compatibility, since the

--===============0901093174==--

---------------------------------------
Received: (at 302740-close) by bugs.debian.org; 8 May 2005 19:51:10 +0000
>From katie@ftp-master.debian.org Sun May 08 12:51:08 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DUrnw-0000YF-00; Sun, 08 May 2005 12:51:08 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1DUrmD-00075N-00; Sun, 08 May 2005 15:49:21 -0400
From: Christian Perrier <bubulle@debian.org>
To: 302740-close@bugs.debian.org
X-Katie: $Revision: 1.55 $
Subject: Bug#302740: fixed in shadow 1:4.0.3-33
Message-Id: <E1DUrmD-00075N-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Sun, 08 May 2005 15:49:21 -0400
Delivered-To: 302740-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: shadow
Source-Version: 1:4.0.3-33

We believe that the bug you reported is fixed in the latest version of
shadow, which is due to be installed in the Debian FTP archive:

login_4.0.3-33_i386.deb
  to pool/main/s/shadow/login_4.0.3-33_i386.deb
passwd_4.0.3-33_i386.deb
  to pool/main/s/shadow/passwd_4.0.3-33_i386.deb
shadow_4.0.3-33.diff.gz
  to pool/main/s/shadow/shadow_4.0.3-33.diff.gz
shadow_4.0.3-33.dsc
  to pool/main/s/shadow/shadow_4.0.3-33.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 302740@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Perrier <bubulle@debian.org> (supplier of updated shadow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun,  8 May 2005 14:32:20 +0200
Source: shadow
Binary: login passwd
Architecture: source i386
Version: 1:4.0.3-33
Distribution: unstable
Urgency: low
Maintainer: Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>
Changed-By: Christian Perrier <bubulle@debian.org>
Description: 
 login      - system login tools
 passwd     - change and administer password and group data
Closes: 162241 193869 242407 249611 302740 304447 304542 308019 308145
Changes: 
 shadow (1:4.0.3-33) unstable; urgency=low
 .
   * The "Don't believe lintian blindly" release
   * Urgency left to low because RC bug fixed but we leave priority
     to sarge-targeted work
   * Debian packaging fixes:
     - Remove CVS id tag from the supplied login.defs file
       Closes: #308019
     - revert dependency on debconf which would make it required
       Closes: #308145
     - Add the missing add-shell, remove-shell, cppw and cpgr
       (Debian specific) man pages
       Closes: #162241
     - make lintian ignore warnings about missing debconf dependency
       in passwd.lintian-overrides
   * Debian specific programs fixes:
     - NONE
   * Upstream bugs not already fixed in upstream releases or CVS:
     - NONE
   * Upstream bugs already fixed in upstream releases or CVS:
     - 313_pam_access_with_preauth:
       - allow PAM account authorization when preauthenticated
         Closes: #193869
     - 314_passwd.1_formatting:
       - minor formatting fixes of passwd(1) man page
         Closes: #304447
     - 315_chage.1_document_expiration_removal:
       - document expiration removal in chage(1)
         Closes: #304542
     - 316_vipw-race-242407:
       - make vipw to remove /etc/{passwd|shadow|group|gshadow}.edit
         and only then unlock
         Closes: #242407
     - 317_lastlog_usage_249611:
       - Fix the lastlog usage and all the translations accordingly
         (--user instead of --login).
         Closes: #249611
     - 323_passwd.1-typo:
       - correct a typo in passwd(1) man page. Closes: #302740
Files: 
 cb9f4fd9d99b1e684b43e8b4f3d04afe 833 base required shadow_4.0.3-33.dsc
 501eea6ea223e6cf73e09aaa83af1049 961469 base required shadow_4.0.3-33.diff.gz
 3616fe7a3c1d20f60c1f27413276356e 531960 base required passwd_4.0.3-33_i386.deb
 267ed226b1587d9a3d99774a70fba64f 576422 base required login_4.0.3-33_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCfmTK1OXtrMAUPS0RAjI8AJ43gUKILtpA7WhQG6ZVqv1mmOj57gCfX5PI
cNeXFwWPhMwEunNC8+Xsi2I=
=TNeQ
-----END PGP SIGNATURE-----