Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Fedora Core 5 Update: shadow-utils-4.0.14-5.FC5 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Fedora Updated package.
Fedora Update Notification

Product     : Fedora Core 5
Name        : shadow-utils
Version     : 4.0.14                      
Release     : 5.FC5                  
Summary     : Utilities for managing accounts and shadow password files.
Description :
The shadow-utils package includes the necessary programs for
converting UNIX password files to the shadow password format, plus
programs for managing user and group accounts. The pwconv command
converts passwords to the shadow password format. The pwunconv command
unconverts shadow passwords and generates an npasswd file (a standard
UNIX password file). The pwck command checks the integrity of password
and shadow files. The lastlog command prints out the last login times
for all users. The useradd, userdel, and usermod commands are used for
managing user accounts. The groupadd, groupdel, and groupmod commands
are used for managing group accounts.


* Wed Mar 22 2006 Peter Vrabec  2:4.0.14-5.FC5
* FC5 update
* Fri Mar 10 2006 Peter Vrabec  2:4.0.14-4
- fix lrename() function to handle relative symlinks too
* Tue Mar  7 2006 Peter Vrabec  2:4.0.14-3
- set default umask to 077 in login.defs
* Mon Mar  6 2006 Peter Vrabec  2:4.0.14-2
- use lrename() function, which follow a destination symbolic link(#181977)

This update can be downloaded from:

b2c9e91005f1a4198fd4286c792e2d833f543be1  SRPMS/shadow-utils-4.0.14-5.FC5.src.rpm
e9817689bc543e7655c831b205e62f09a3679638  ppc/shadow-utils-4.0.14-5.FC5.ppc.rpm
12e0f7f9159b760b012a399de0e42642eede49a8  ppc/debug/shadow-utils-debuginfo-4.0.14-5.FC5.ppc.rpm
27a88bf5b29df69a69ebf1db3009105913ad4cf3  x86_64/shadow-utils-4.0.14-5.FC5.x86_64.rpm
92984c115dfa1b6289f2c00ae82c903f24e0dc8f  x86_64/debug/shadow-utils-debuginfo-4.0.14-5.FC5.x86_64.rpm
df13ffef232ee2638c773fc517d4da060e048844  i386/shadow-utils-4.0.14-5.FC5.i386.rpm
f52936f4e7dffa3e33bee1fd1d184d1469ff9990  i386/debug/shadow-utils-debuginfo-4.0.14-5.FC5.i386.rpm

This update can be installed with the 'yum' update program.  Use 'yum update
package-name' at the command line.  For more information, refer to 'Managing
Software with yum,' available at

fedora-announce-list mailing list
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didnít Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.