summaryrefslogtreecommitdiff
path: root/debian/patches-applied/043_pam_unix_unknown_user_not_alert
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches-applied/043_pam_unix_unknown_user_not_alert')
-rw-r--r--debian/patches-applied/043_pam_unix_unknown_user_not_alert41
1 files changed, 41 insertions, 0 deletions
diff --git a/debian/patches-applied/043_pam_unix_unknown_user_not_alert b/debian/patches-applied/043_pam_unix_unknown_user_not_alert
new file mode 100644
index 00000000..1aafc4f6
--- /dev/null
+++ b/debian/patches-applied/043_pam_unix_unknown_user_not_alert
@@ -0,0 +1,41 @@
+Patch for Debian bugs #95220, #175900
+
+A wrong username doesn't need to be logged as an 'alert', a 'warning'
+should be sufficient.
+
+Authors: Sam Hartman <hartmans@debian.org>
+
+Upstream status: committed to CVS
+
+Index: Linux-PAM/modules/pam_unix/support.c
+===================================================================
+--- Linux-PAM/modules/pam_unix/support.c.orig
++++ Linux-PAM/modules/pam_unix/support.c
+@@ -675,12 +675,12 @@
+ if (on(UNIX_AUDIT, ctrl)) {
+ /* this might be a typo and the user has given a password
+ instead of a username. Careful with this. */
+- pam_syslog(pamh, LOG_ALERT,
++ pam_syslog(pamh, LOG_WARNING,
+ "check pass; user (%s) unknown", name);
+ } else {
+ name = NULL;
+ if (on(UNIX_DEBUG, ctrl) || pwd == NULL) {
+- pam_syslog(pamh, LOG_ALERT,
++ pam_syslog(pamh, LOG_WARNING,
+ "check pass; user unknown");
+ } else {
+ /* don't log failure as another pam module can succeed */
+Index: Linux-PAM/modules/pam_unix/unix_chkpwd.c
+===================================================================
+--- Linux-PAM/modules/pam_unix/unix_chkpwd.c.orig
++++ Linux-PAM/modules/pam_unix/unix_chkpwd.c
+@@ -179,7 +179,7 @@
+ }
+ }
+ if (pwd == NULL || salt == NULL) {
+- _log_err(LOG_ALERT, "check pass; user unknown");
++ _log_err(LOG_WARNING, "check pass; user unknown");
+ p = NULL;
+ return PAM_USER_UNKNOWN;
+ }