summaryrefslogtreecommitdiff
path: root/debian/patches/do_not_check_nis_accidentally
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches/do_not_check_nis_accidentally')
-rw-r--r--debian/patches/do_not_check_nis_accidentally29
1 files changed, 0 insertions, 29 deletions
diff --git a/debian/patches/do_not_check_nis_accidentally b/debian/patches/do_not_check_nis_accidentally
deleted file mode 100644
index 5ef39a00..00000000
--- a/debian/patches/do_not_check_nis_accidentally
+++ /dev/null
@@ -1,29 +0,0 @@
-From: Sam Hartman <hartmans@debian.org>
-Date: Mon, 11 Sep 2023 14:00:42 -0600
-Subject: do_not_check_nis_accidentally
-
-Patch for Debian bug #469635
-
-Always call _unix_getpwnam() consistent with the value of the 'nis'
-option, so that we only grab from the backends we're expecting.
-
-Authors: Quentin Godfroy <godfroy@clipper.ens.fr>
-
-Upstream status: should be submitted
----
- modules/pam_unix/pam_unix_passwd.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/modules/pam_unix/pam_unix_passwd.c b/modules/pam_unix/pam_unix_passwd.c
-index 5b81343..78f8e20 100644
---- a/modules/pam_unix/pam_unix_passwd.c
-+++ b/modules/pam_unix/pam_unix_passwd.c
-@@ -660,7 +660,7 @@ pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv)
- return PAM_USER_UNKNOWN;
- } else {
- struct passwd *pwd;
-- _unix_getpwnam(pamh, user, 1, 1, &pwd);
-+ _unix_getpwnam(pamh, user, 1, on(UNIX_NIS, ctrl), &pwd);
- if (pwd == NULL) {
- pam_syslog(pamh, LOG_DEBUG,
- "user \"%s\" has corrupted passwd entry",