Package: passwd Version: 1:4.0.3-35 Severity: minor Tags: patch
Found some typos in '/usr/share/man/man5/gshadow.5.gz', see attached '.diff'. Hope this helps... -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/dash Kernel: Linux 2.6.11-1-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C) Versions of packages passwd depends on: ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an ii libpam-modules 0.76-22 Pluggable Authentication Modules f ii libpam0g 0.76-22 Pluggable Authentication Modules l ii login 1:4.0.3-35 system login tools -- debconf information excluded
--- - 2005-06-08 00:51:40.964562000 -0400 +++ /tmp/gshadow5.gz.21228 2005-06-08 00:51:40.000000000 -0400 @@ -31,7 +31,7 @@ .SH DESCRIPTION .I gshadow contains the shadowed information for group accounts. -It contains lines with the folowing colon\-separated fields: +It contains lines with the following colon\-separated fields: .IP "" .5i Group name .IP "" .5i @@ -42,14 +42,14 @@ Comma\-separated list of group members. .PP The group name and password fields must be filled. -The encryped password consists of 13 characters from the 64\-character +The encrypted password consists of 13 characters from the 64\-character alphabet a thru z, A thru Z, 0 thru 9, \. and /. Refer to \fBcrypt\fR(3) for details on how this string is interpreted. If the password field contains some string that is not valid result of \fBcrypt\fR(3), for instance ! or *, the user will not be able to use a unix password to log in, subject to \fBpam\fR(7). .PP -This information supercedes any password present in \fI/etc/group\fR. +This information supersedes any password present in \fI/etc/group\fR. .PP This file must not be readable by regular users if password security is to be maintained.