Bug 1488616 - New accounts whose password is in /etc/shadow are not getting exported in shadow.byname; #011-> Error #-3
Summary: New accounts whose password is in /etc/shadow are not getting exported in sha...
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: ypserv
Version: 37
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: ---
Assignee: Matej Mužila
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-09-05 20:35 UTC by RobbieTheK
Modified: 2023-12-05 20:58 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-12-05 20:58:22 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 85262 0 medium CLOSED Incorrect answer to MATCH when map does not exist 2021-02-22 00:41:40 UTC
Red Hat Bugzilla 1478129 0 unspecified CLOSED rpc.idmapd fails to initialize libnfsidmap settings due to clashing conf file parsing routines 2021-02-22 00:41:40 UTC

Internal Links: 1466850 1665536

Description RobbieTheK 2017-09-05 20:35:03 UTC
When creating new NIS accounts, whose passwords are in /etc/shadow, they are not getting exported in shadow.byname.

ypserv-2.32.1-8.fc26.x86_64
ypbind-1.38-10.fc26.x86_64
rpcbind-0.2.4-7.rc2.fc26.x86_64

contents of /etc/ypserv.conf:
files: 30
dns: no
slp: no
slp_timeout: 3600
xfr_check_port: yes
*                        : *       : passwd.byname    : none
*                        : *       : passwd.byuid     : none
# Not everybody should see the shadow passwords, not secure, since
# under MSDOG everbody is root and can access ports < 1024 !!!
# To enable NIS password verification from non-privileged processes the following line may need to be added (before others for shadow.byname) to /etc/ypserv.c
ourip : * : shadow.byname : none

Here are the logs in context whilst a user is being created with debug on ypbind and ypserv:

Sep  5 15:50:49 ourhostname ypserv[2265]: #011 -> First value returned.
Sep  5 15:50:49 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:49 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:600]
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011mapname = "passwd.byname"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011keydat = "testuser"
Sep  5 15:50:49 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:49 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byname")
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011->Returning OK!
Sep  5 15:50:49 ourhostname ypserv[2265]: Opening: ourdomain/passwd.byname (3) 689cc8b0
Sep  5 15:50:49 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:49 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:49 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:601]
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011mapname = "passwd.byname"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011keydat = "testuser"
Sep  5 15:50:49 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:49 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byname")
Sep  5 15:50:49 ourhostname ypserv[2265]: Found: ourdomain/passwd.byname (0)
Sep  5 15:50:49 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:49 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:49 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:602]
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011mapname = "passwd.byuid"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011keydat = "6518"
Sep  5 15:50:49 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:49 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byuid")
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011->Returning OK!
Sep  5 15:50:49 ourhostname ypserv[2265]: Opening: ourdomain/passwd.byuid (4) 689ddbf0
Sep  5 15:50:49 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:49 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:49 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:603]
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011mapname = "passwd.byuid"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011keydat = "6518"
Sep  5 15:50:49 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:49 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byuid")
Sep  5 15:50:49 ourhostname ypserv[2265]: Found: ourdomain/passwd.byuid (0)
Sep  5 15:50:49 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:49 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:49 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:604]
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011mapname = "passwd.byname"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011keydat = "testuser"
Sep  5 15:50:49 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:49 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byname")
Sep  5 15:50:49 ourhostname ypserv[2265]: Found: ourdomain/passwd.byname (1)
Sep  5 15:50:49 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:49 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:49 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:605]
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011mapname = "passwd.byname"
Sep  5 15:50:49 ourhostname ypserv[2265]: #011#011keydat = "testuser"
Sep  5 15:50:49 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:49 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byname")
Sep  5 15:50:49 ourhostname ypserv[2265]: Found: ourdomain/passwd.byname (1)
Sep  5 15:50:49 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:49 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:50 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:609]
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011mapname = "passwd.byname"
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011keydat = "testuser"
Sep  5 15:50:50 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:50 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byname")
Sep  5 15:50:50 ourhostname ypserv[2265]: Found: ourdomain/passwd.byname (1)
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:50 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:50 ourhostname ypserv[2265]: ypproc_match(): [From: ourip:610]
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011domainname = "ourdomain"
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011mapname = "passwd.byname"
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011keydat = "testuser"
Sep  5 15:50:50 ourhostname ypserv[2265]: connect from ourip
Sep  5 15:50:50 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "passwd.byname")
Sep  5 15:50:50 ourhostname ypserv[2265]: Found: ourdomain/passwd.byname (1)
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close() called
Sep  5 15:50:50 ourhostname ypserv[2265]: #011-> Error #-3
Sep  5 15:50:50 ourhostname ypserv[2265]: ypproc_clear_2_svc() [From: 127.0.0.1:631]
Sep  5 15:50:50 ourhostname ypserv[2265]: connect from 127.0.0.1
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close_all() called
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close_all (ourdomain/passwd.byuid|0)
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close_all (ourdomain/passwd.byname|1)
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close_all (ourdomain/group.byname|2)
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close_all (ourdomain/netid.byname|3)
Sep  5 15:50:50 ourhostname ypserv[2265]: ypdb_close_all (ourdomain/ypservers|4)
Sep  5 15:50:50 ourhostname ypserv[2265]: ypproc_all_2_svc(): [From: ourip:637]
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011domain = "ourdomain"
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011map = "ypservers"
Sep  5 15:50:50 ourhostname ypserv[2265]: #011ypdb_open("ourdomain", "ypservers")
Sep  5 15:50:50 ourhostname ypserv[2265]: #011#011->Returning OK!

And we sporadically have been seeing logs like:
add_host_addrs: hostname lookup failed: No address associated with hostname

And:

ypserv: refused connect from ourip:50723 to procedure ypproc_match (ourdomain,shadow.byname;-1)

Does Error #-3 mean anything useful? I linked an old bug, 85262, as possibly related for the last errors. Some of these could just be red herrings.

Comment 1 RobbieTheK 2017-09-08 03:50:55 UTC
Seeing errors like this too:

Sep  6 14:48:29 dsm rpc.yppasswdd[12874]: crypt() call failed.
Sep  6 14:48:29 dsm rpc.yppasswdd[12874]: update user (uid=xxxx) from host xx.xx.xx.xx rejected
Sep  6 14:48:29 dsm rpc.yppasswdd[12874]: Invalid password.

Comment 2 Petr Kubat 2017-09-11 09:42:45 UTC
Hi Robert, thanks for reporting this.

Unfortunately I have no idea what "Error #-3" means either, will look into the issue.

Comment 3 RobbieTheK 2017-09-11 20:13:37 UTC
(In reply to Petr Kubat from comment #2)
> Hi Robert, thanks for reporting this.
> 
> Unfortunately I have no idea what "Error #-3" means either, will look into
> the issue.

I'm starting to think it's either firewalld or rpc.idmapd failings to initialize libnfsidmap as in https://bugzilla.redhat.com/show_bug.cgi?id=1478129

Here's our firewall-cmd --list-all
public
  target: default
  icmp-block-inversion: no
  interfaces: 
  sources: 
  services: ssh mdns dhcpv6-client nfs mountd smtp https http rpc-bind dns samba samba-client
  ports: 944/tcp 945/tcp 945/udp 946/udp
  protocols: 
  masquerade: no
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 

Then rpcinfo -p localhost
   program vers proto   port  service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
    100024    1   udp  58498  status
    100024    1   tcp  33419  status
 600100069    1   udp    945  fypxfrd
    100004    2   udp    834  ypserv
 600100069    1   tcp    945  fypxfrd
    100004    1   udp    834  ypserv
    100004    2   tcp    838  ypserv
    100009    1   udp    946  yppasswdd
    100004    1   tcp    838  ypserv
    100007    2   udp    840  ypbind
    100007    1   udp    840  ypbind
    100007    2   tcp    843  ypbind
    100007    1   tcp    843  ypbind
    100005    1   udp  20048  mountd
    100005    1   tcp  20048  mountd
    100005    2   udp  20048  mountd
    100005    2   tcp  20048  mountd
    100005    3   udp  20048  mountd
    100005    3   tcp  20048  mountd
    100003    3   tcp   2049  nfs
    100003    4   tcp   2049  nfs
    100227    3   tcp   2049  nfs_acl
    100021    1   udp  40006  nlockmgr
    100021    3   udp  40006  nlockmgr
    100021    4   udp  40006  nlockmgr
    100021    1   tcp  40995  nlockmgr
    100021    3   tcp  40995  nlockmgr
    100021    4   tcp  40995  nlockmgr

However from the slave server /usr/lib64/yp/ypinit -s IP_of_master
Can't enumerate maps from IP_of_master. Please check that it is running.

Stopping firewalld and all's well.

Are there other custom xml files needed to be created in  /usr/lib/firewalld/services/?

Comment 4 Fedora End Of Life 2018-05-03 08:07:48 UTC
This message is a reminder that Fedora 26 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 26. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora  'version'
of '26'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version'
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not
able to fix it before Fedora 26 is end of life. If you would still like
to see this bug fixed and are able to reproduce it against a later version
of Fedora, you are encouraged  change the 'version' to a later Fedora
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's
lifetime, sometimes those efforts are overtaken by events. Often a
more recent Fedora release includes newer upstream software that fixes
bugs or makes them obsolete.

Comment 5 Fedora End Of Life 2018-05-29 11:50:30 UTC
Fedora 26 changed to end-of-life (EOL) status on 2018-05-29. Fedora 26
is no longer maintained, which means that it will not receive any
further security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.

Comment 6 RobbieTheK 2020-08-31 17:53:22 UTC
Still seeing this in Fedora 32
Aug 31 13:49:46  ypserv[3482940]: ypproc_match_2 from x.x.x.x port 46312
Aug 31 13:49:46  ypserv[3482940]: #011#011domainname = "xxx"
Aug 31 13:49:46  ypserv[3482940]: #011#011mapname = "hosts.byname"
Aug 31 13:49:46  ypserv[3482940]: #011#011keydat = "fedoraproject.org"
Aug 31 13:49:46  ypserv[3482940]: connect from x.x.x.x port 46312 to procedure ypproc_match (xxx,hosts.byname;1)
Aug 31 13:49:46  ypserv[3482940]: #011ypdb_open("xxx", "hosts.byname")
Aug 31 13:49:46  ypserv[3482940]: Found: xxx/hosts.byname (8)
Aug 31 13:49:46  ypserv[3482940]: ypdb_close() called
Aug 31 13:49:46  ypserv[3482940]: #011-> Error #-3

Comment 7 RobbieTheK 2021-09-20 17:41:36 UTC
On Fedora 34 from journalctl -g pam -xe I see lots of:
Sep 18 08:19:21 ypserv[282972]: #011#011keydat = "pam_unix_non_existent:"

From systemctl status ypserv with -d on restart:
Sep 20 13:25:23 ourdomain.edu ypserv[282972]:         ypdb_open("ourdomain", "hosts.byname")
Sep 20 13:25:23 ourdomain.edu ypserv[282972]: Found: ourdomainh/hosts.byname (8)
Sep 20 13:25:23 ourdomain.edu ypserv[282972]: ypdb_close() called
Sep 20 13:25:23 ourdomain.edu ypserv[282972]:         -> Error #-3

sample from  /var/log/messages
Sep 20 13:38:13 ypserv[282972]: ypproc_match_2 from x.x.x.x port 34923
Sep 20 13:38:13 ypserv[282972]: #011#011domainname = "ourdomain"
Sep 20 13:38:13 ypserv[282972]: #011#011mapname = "hosts.byname"
Sep 20 13:38:13 ypserv[282972]: #011#011keydat = "incoming.telemetry.mozilla.org"
Sep 20 13:38:13 ypserv[282972]: connect from 150.108.64.56 port 34923 to procedure ypproc_match (ourdomain,hosts.byname;1)
Sep 20 13:38:13 ypserv[282972]: #011ypdb_open("ourdomain", "hosts.byname")
Sep 20 13:38:13 ypserv[282972]: Found: ourdomain/hosts.byname (9)
Sep 20 13:38:13 ypserv[282972]: ypdb_close() called
Sep 20 13:38:13 ypserv[282972]: #011-> Error #-3

Can this be looked at again?

Comment 8 mkulik 2021-09-27 15:55:39 UTC
Hi,

I took a look a this and here are few things that I manage to find out:

Firstly, let's try to check what this Error #-3 is. That should be quite easy with debug messages provided by you.
Quick search and we can find those debug messages here: https://github.com/thkukuk/ypserv/blob/bccf93bb882a049d1817035cfcee83816947be47/ypserv/server.c#L177
This error message comes from line: 275 and that means that '-3' corresponds to YP_NOKEY constant.
Let's check that: https://github.com/deplinenoise/amiga-sdk/blob/master/netinclude/rpcsvc/yp.x#L20
That's seems correct, so this 'Error' is not an actual error but just information that:
incoming.telemetry.mozilla.org key is not present in /etc/hosts file.

> The key and value pairs (also known as records) that are created from the entries in the/etc/hosts file comprise the hosts.byname map

I think that you shouldn't worry about this error unless that record should be there but
I would check locally first to confirm if that's the case.

Regarding 'pam_unix_non_existent' string in the logs. This is a result of fixing potential loophole that allowed to
determine existence of user. More information about this issue here: https://github.com/linux-pam/linux-pam/commit/30fdfb90d9864bcc254a62760aaa149d373fd4eb
Basically to block potential attacker from using that function to determine 'if users exists' by analyzing
time execution, fake/real iteration was added which prevents attacker from using that loophole.

That's why in your logs you can see 'pam_unix_non_existent'. This is a fake, non-existent account name that is used in 2nd iteration (in your case).

Comment 9 RobbieTheK 2021-09-27 18:24:10 UTC
(In reply to mkulik from comment #8)
> Hi,
> 
> I took a look a this and here are few things that I manage to find out:
> 
> Firstly, let's try to check what this Error #-3 is. That should be quite
> easy with debug messages provided by you.
> Quick search and we can find those debug messages here:
> https://github.com/thkukuk/ypserv/blob/
> bccf93bb882a049d1817035cfcee83816947be47/ypserv/server.c#L177
> This error message comes from line: 275 and that means that '-3' corresponds
> to YP_NOKEY constant.
> Let's check that:
> https://github.com/deplinenoise/amiga-sdk/blob/master/netinclude/rpcsvc/yp.
> x#L20
> That's seems correct, so this 'Error' is not an actual error but just
> information that:
> incoming.telemetry.mozilla.org key is not present in /etc/hosts file.
> 
> > The key and value pairs (also known as records) that are created from the entries in the/etc/hosts file comprise the hosts.byname map

OK perhaps the title of this bug should be a feature request to change the wording from "Error #-3" to something more informative like "Error #-3, domain is not in /etc/hosts" but perhaps that isn't quite right as that could be thousands of domains? 

> I think that you shouldn't worry about this error unless that record should
> be there but
> I would check locally first to confirm if that's the case.

Well there is a log that indicates an IP that is definitely in /etc/hosts (obfuscated but you get the point):

Sep 27 14:11:07 ourhost ypserv[527368]: connect from 150.108.x.y port 52652 to procedure ypproc_match (ournisdomain,hosts.byname;1)
Sep 27 14:11:07 ourhost ypserv[527368]: #011ypdb_open("ournisdomain", "hosts.byname")
Sep 27 14:11:07 ourhost ypserv[527368]: Found: ournisdomain/hosts.byname (5)
Sep 27 14:11:07 ourhost ypserv[527368]: ypdb_close() called
Sep 27 14:11:07 ourhost ypserv[527368]: #011-> Error #-3


> Regarding 'pam_unix_non_existent' string in the logs. This is a result of
> fixing potential loophole that allowed to
> determine existence of user. More information about this issue here:
> https://github.com/linux-pam/linux-pam/commit/
> 30fdfb90d9864bcc254a62760aaa149d373fd4eb
> Basically to block potential attacker from using that function to determine
> 'if users exists' by analyzing
> time execution, fake/real iteration was added which prevents attacker from
> using that loophole.
> 
> That's why in your logs you can see 'pam_unix_non_existent'. This is a fake,
> non-existent account name that is used in 2nd iteration (in your case).

Thanks for the explanation of both. Perhaps others will benefit if/when they land here from a search.

FWIW, some users are recommending to block the Firefox telemetry, i.e., "phone home": https://forum.mxlinux.org/viewtopic.php?t=57301

Comment 10 RobbieTheK 2021-09-27 18:35:22 UTC
Forgot to mention a separate issue not sure if it's deserving of it's own entry but we also see this error even though SELinux is disabled:
setsebool: Could not change active booleans: Invalid boolean

Comment 11 mkulik 2021-10-13 08:18:00 UTC
I'm not sure but setsebool was already fixed in ypbind and It will be included with next release. If the same issue is present but for ypserv package, a new bug should be created for it.

Regarding this -3 error. It shows you (ofc that depends on configuration) that NIS client connected to your NIS server and it want's to performs a key lookup for: incoming.telemetry.mozilla.org.
Map file is present on server but lookup failed because key is not present.

Comment 12 Ben Cotton 2022-05-12 16:57:43 UTC
This message is a reminder that Fedora Linux 34 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora Linux 34 on 2022-06-07.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
'version' of '34'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, change the 'version' 
to a later Fedora Linux version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora Linux 34 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora Linux, you are encouraged to change the 'version' to a later version
prior to this bug being closed.

Comment 13 Ben Cotton 2022-11-29 16:45:22 UTC
This message is a reminder that Fedora Linux 35 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora Linux 35 on 2022-12-13.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
'version' of '35'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, change the 'version' 
to a later Fedora Linux version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora Linux 35 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora Linux, you are encouraged to change the 'version' to a later version
prior to this bug being closed.

Comment 14 Ben Cotton 2022-12-13 15:12:16 UTC
Fedora Linux 35 entered end-of-life (EOL) status on 2022-12-13.

Fedora Linux 35 is no longer maintained, which means that it
will not receive any further security or bug fix updates. As a result we
are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora Linux
please feel free to reopen this bug against that version. Note that the version
field may be hidden. Click the "Show advanced fields" button if you do not see
the version field.

If you are unable to reopen this bug, please file a new report against an
active release.

Thank you for reporting this bug and we are sorry it could not be fixed.

Comment 15 Aoife Moloney 2023-11-23 00:01:40 UTC
This message is a reminder that Fedora Linux 37 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora Linux 37 on 2023-12-05.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
'version' of '37'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, change the 'version' 
to a later Fedora Linux version. Note that the version field may be hidden.
Click the "Show advanced fields" button if you do not see it.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora Linux 37 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora Linux, you are encouraged to change the 'version' to a later version
prior to this bug being closed.

Comment 16 Aoife Moloney 2023-12-05 20:58:22 UTC
Fedora Linux 37 entered end-of-life (EOL) status on None.

Fedora Linux 37 is no longer maintained, which means that it
will not receive any further security or bug fix updates. As a result we
are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora Linux
please feel free to reopen this bug against that version. Note that the version
field may be hidden. Click the "Show advanced fields" button if you do not see
the version field.

If you are unable to reopen this bug, please file a new report against an
active release.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.