[Pkg-shadow-devel] [Git][debian/adduser][wip/new-shadow] 2 commits: Depend on passwd 1:4.19.0-2
Marc Haber (@zugschlus)
gitlab at salsa.debian.org
Sat Jan 10 19:56:06 GMT 2026
Marc Haber pushed to branch wip/new-shadow at Debian / adduser
Commits:
9f191f0d by Marc Haber at 2026-01-10T20:46:14+01:00
Depend on passwd 1:4.19.0-2
src:shadow 4.19.0 has tightened its user name checks. Our check
for the crontab hijack vulnerability is therefore no longer possible.
The change to src:shadow prevents that vulnerability earlier than we
could, so we depend on that version now.
- - - - -
5c05dc83 by Marc Haber at 2026-01-10T20:52:17+01:00
Give chpasswd test values that it will accept
This is to work around the more picky chpasswd in new src:shadow
- - - - -
2 changed files:
- debian/control
- debian/tests/f/adduser_system.t
Changes:
=====================================
debian/control
=====================================
@@ -13,7 +13,7 @@ Package: adduser
Architecture: all
Multi-Arch: foreign
Pre-Depends: ${misc:Pre-Depends}
-Depends: passwd (>= 1:4.17.2-5), ${misc:Depends}
+Depends: passwd (>= 1:4.19.0-4), ${misc:Depends}
Suggests: liblocale-gettext-perl, perl, cron, quota
Description: add and remove users and groups
This package includes the 'adduser' and 'deluser' commands for creating
=====================================
debian/tests/f/adduser_system.t
=====================================
@@ -204,9 +204,9 @@ assert_command_success(
assert_user_exists('aust');
assert_user_is_system('aust');
-system('echo "aust:!foobar" | chpasswd --encrypted');
-# with #1099734 fixed, this should fail
-assert_command_result_silent(RET_WRONG_OBJECT_PROPERTIES,
+system('echo "aust:!" | chpasswd --encrypted');
+ok(1, "set passwd to !");
+assert_command_success(
'/usr/sbin/adduser',
'--stdoutmsglevel=error', '--stderrmsglevel=error',
'--system',
@@ -216,9 +216,11 @@ assert_command_result_silent(RET_WRONG_OBJECT_PROPERTIES,
assert_user_exists('aust');
assert_user_is_system('aust');
-system('echo "aust:*foobar" | chpasswd --encrypted');
-ok(1, "set passwd to *foobar");
-assert_command_success(
+# $ mkpasswd --hash=yescrypt foobar
+# $y$j9T$dDqPXxXOCZL14/3jiuscW.$P8VGTWHqO1.qLOJs5Mas7Vzj3Ni9Es3QhACrVa0Z5Z3
+system(qq{echo 'aust:!\$y\$j9T\$dDqPXxXOCZL14/3jiuscW.\$P8VGTWHqO1.qLOJs5Mas7Vzj3Ni9Es3QhACrVa0Z5Z3' | chpasswd --encrypted});
+ok(1, "set passwd to !foobar");
+assert_command_result_silent(RET_WRONG_OBJECT_PROPERTIES,
'/usr/sbin/adduser',
'--stdoutmsglevel=error', '--stderrmsglevel=error',
'--system',
@@ -227,12 +229,20 @@ assert_command_success(
);
assert_user_exists('aust');
assert_user_is_system('aust');
-assert_command_success(
- '/usr/sbin/deluser',
+
+# $ mkpasswd --hash=yescrypt foobar
+# $y$j9T$dDqPXxXOCZL14/3jiuscW.$P8VGTWHqO1.qLOJs5Mas7Vzj3Ni9Es3QhACrVa0Z5Z3
+system(qq{echo 'aust:*\$y\$j9T\$dDqPXxXOCZL14/3jiuscW.\$P8VGTWHqO1.qLOJs5Mas7Vzj3Ni9Es3QhACrVa0Z5Z3' | chpasswd --encrypted});
+ok(1, "set passwd to *foobar");
+assert_command_result_silent(RET_WRONG_OBJECT_PROPERTIES,
+ '/usr/sbin/adduser',
'--stdoutmsglevel=error', '--stderrmsglevel=error',
'--system',
+ '--disabled-login',
'aust'
);
+assert_user_exists('aust');
+assert_user_is_system('aust');
# ref #100032
# test --home
View it on GitLab: https://salsa.debian.org/debian/adduser/-/compare/c7c52b6c3074b28eccacb473588550530ee0777b...5c05dc83c4450a6f2bc044104599095f0038f666
--
View it on GitLab: https://salsa.debian.org/debian/adduser/-/compare/c7c52b6c3074b28eccacb473588550530ee0777b...5c05dc83c4450a6f2bc044104599095f0038f666
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-shadow-devel/attachments/20260110/7cce19bf/attachment-0001.htm>
More information about the Pkg-shadow-devel
mailing list