summaryrefslogtreecommitdiff
path: root/debian/patches-applied/026_pam_unix_passwd_unknown_user
diff options
context:
space:
mode:
authorSam Hartman <hartmans@debian.org>2023-09-11 13:59:49 -0600
committerSam Hartman <hartmans@debian.org>2023-09-11 13:59:49 -0600
commitb99a4f53dcf4725e4b3b861fd8a28c0156a8a147 (patch)
treebee6fb35bc2f39151baa07c0900d84edc0586252 /debian/patches-applied/026_pam_unix_passwd_unknown_user
parent69c75a3fc72c1ec309b5bcca8dd82f59831968cc (diff)
Use gbp pq for patches, Closes: #995239
Diffstat (limited to 'debian/patches-applied/026_pam_unix_passwd_unknown_user')
-rw-r--r--debian/patches-applied/026_pam_unix_passwd_unknown_user33
1 files changed, 0 insertions, 33 deletions
diff --git a/debian/patches-applied/026_pam_unix_passwd_unknown_user b/debian/patches-applied/026_pam_unix_passwd_unknown_user
deleted file mode 100644
index d277fee9..00000000
--- a/debian/patches-applied/026_pam_unix_passwd_unknown_user
+++ /dev/null
@@ -1,33 +0,0 @@
-Description: distinguish between password manipulation failure and missing user.
-Author: Martin Schwenke <martin@meltin.net>
-
-Index: pam/modules/pam_unix/passverify.c
-===================================================================
---- pam.orig/modules/pam_unix/passverify.c
-+++ pam/modules/pam_unix/passverify.c
-@@ -801,7 +801,7 @@
- struct passwd *tmpent = NULL;
- struct stat st;
- FILE *pwfile, *opwfile;
-- int err = 1;
-+ int err = 1, found = 0;
- int oldmask;
- #ifdef WITH_SELINUX
- char *prev_context_raw = NULL;
-@@ -872,6 +872,7 @@
-
- tmpent->pw_passwd = assigned_passwd.charp;
- err = 0;
-+ found = 1;
- }
- if (putpwent(tmpent, pwfile)) {
- D(("error writing entry to password file: %m"));
-@@ -914,7 +915,7 @@
- return PAM_SUCCESS;
- } else {
- unlink(PW_TMPFILE);
-- return PAM_AUTHTOK_ERR;
-+ return found ? PAM_AUTHTOK_ERR : PAM_USER_UNKNOWN;
- }
- }
-