diff options
author | Steve Langasek <vorlon@debian.org> | 2022-04-25 16:12:04 -0700 |
---|---|---|
committer | Steve Langasek <vorlon@debian.org> | 2022-04-25 16:12:04 -0700 |
commit | 0518aa196ccc4bc59ba33228ebf1cdfbb4cd85a8 (patch) | |
tree | 2974c9664931750d19f7ba4f0d7e69d15ac5d913 /debian/patches-applied/021_nis_cleanup | |
parent | ea04efa24985743014da9dd22c0581cbaef82ede (diff) | |
parent | 3cd1f867ea5668cb8de1f99a68618b7601a99f6a (diff) |
pam (1.4.0-13) unstable; urgency=medium
* Don't build with NIS support. This is only used for password changes on
NIS systems, and is pulling a large dependency chain into the Essential
package set which is not justifiable.
[dgit import unpatched pam 1.4.0-13]
Diffstat (limited to 'debian/patches-applied/021_nis_cleanup')
-rw-r--r-- | debian/patches-applied/021_nis_cleanup | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/debian/patches-applied/021_nis_cleanup b/debian/patches-applied/021_nis_cleanup new file mode 100644 index 00000000..f05c7103 --- /dev/null +++ b/debian/patches-applied/021_nis_cleanup @@ -0,0 +1,24 @@ +Patch from Philippe Troin <phil@fifi.org> + +Originally this included a bunch of changes to locking, but the more +recent code pulled from Linux_pam CVS seems to fix that issue. + +Index: pam/modules/pam_unix/pam_unix_passwd.c +=================================================================== +--- pam.orig/modules/pam_unix/pam_unix_passwd.c ++++ pam/modules/pam_unix/pam_unix_passwd.c +@@ -708,9 +708,12 @@ + "password - (old) token not obtained"); + return retval; + } +- /* verify that this is the password for this user */ ++ /* verify that this is the password for this user ++ * if we're not using NIS */ + +- retval = _unix_verify_password(pamh, user, pass_old, ctrl); ++ if (off(UNIX_NIS, ctrl)) { ++ retval = _unix_verify_password(pamh, user, pass_old, ctrl); ++ } + } else { + D(("process run by root so do nothing this time around")); + pass_old = NULL; |