diff options
Diffstat (limited to 'debian/patches/do_not_check_nis_accidentally')
-rw-r--r-- | debian/patches/do_not_check_nis_accidentally | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/debian/patches/do_not_check_nis_accidentally b/debian/patches/do_not_check_nis_accidentally deleted file mode 100644 index 5ef39a00..00000000 --- a/debian/patches/do_not_check_nis_accidentally +++ /dev/null @@ -1,29 +0,0 @@ -From: Sam Hartman <hartmans@debian.org> -Date: Mon, 11 Sep 2023 14:00:42 -0600 -Subject: do_not_check_nis_accidentally - -Patch for Debian bug #469635 - -Always call _unix_getpwnam() consistent with the value of the 'nis' -option, so that we only grab from the backends we're expecting. - -Authors: Quentin Godfroy <godfroy@clipper.ens.fr> - -Upstream status: should be submitted ---- - modules/pam_unix/pam_unix_passwd.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/modules/pam_unix/pam_unix_passwd.c b/modules/pam_unix/pam_unix_passwd.c -index 5b81343..78f8e20 100644 ---- a/modules/pam_unix/pam_unix_passwd.c -+++ b/modules/pam_unix/pam_unix_passwd.c -@@ -660,7 +660,7 @@ pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv) - return PAM_USER_UNKNOWN; - } else { - struct passwd *pwd; -- _unix_getpwnam(pamh, user, 1, 1, &pwd); -+ _unix_getpwnam(pamh, user, 1, on(UNIX_NIS, ctrl), &pwd); - if (pwd == NULL) { - pam_syslog(pamh, LOG_DEBUG, - "user \"%s\" has corrupted passwd entry", |