diff options
author | Steve Langasek <vorlon@debian.org> | 2008-08-27 01:21:30 -0700 |
---|---|---|
committer | Steve Langasek <steve.langasek@ubuntu.com> | 2019-01-03 17:28:20 -0800 |
commit | 2526c272fd267bb71314c4b2bf57227e480c25e6 (patch) | |
tree | 53802b33a89e435269cf0e884ef4de1c403164db /debian/patches-applied | |
parent | 4f59e939a5734736b8a14fd2e01c1062dff8c9dd (diff) |
055_pam_unix_nullok_secure: also don't call the helper at all from
_unix_blankpasswd when we can detect that null passwords are disallowed,
to avoid causing spammy logs on successful authentications.
Closes: #496620.
Diffstat (limited to 'debian/patches-applied')
-rw-r--r-- | debian/patches-applied/055_pam_unix_nullok_secure | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/debian/patches-applied/055_pam_unix_nullok_secure b/debian/patches-applied/055_pam_unix_nullok_secure index 745a8e55..18f9f95b 100644 --- a/debian/patches-applied/055_pam_unix_nullok_secure +++ b/debian/patches-applied/055_pam_unix_nullok_secure @@ -67,11 +67,11 @@ Index: pam.deb/modules/pam_unix/support.c args[2]=strdup("nullok"); } else { args[2]=strdup("nonull"); -@@ -554,6 +573,17 @@ - if (salt) - _pam_delete(salt); +@@ -527,6 +546,17 @@ + if (on(UNIX__NONULL, ctrl)) + return 0; /* will fail but don't let on yet */ -+ if ((retval == 1) && on(UNIX_NULLOK_SECURE, ctrl)) { ++ if (on(UNIX_NULLOK_SECURE, ctrl)) { + int retval2; + const void *uttyname; + retval2 = pam_get_item(pamh, PAM_TTY, &uttyname); @@ -82,9 +82,9 @@ Index: pam.deb/modules/pam_unix/support.c + return 0; + } + - return retval; - } + /* UNIX passwords area */ + retval = get_pwd_hash(pamh, name, &pwd, &salt); @@ -613,7 +643,8 @@ } } |