From 5bbcd8f9bad73877325151b2024c6cdd858174b5 Mon Sep 17 00:00:00 2001 From: Steve Langasek Date: Tue, 22 Jan 2019 15:21:19 -0800 Subject: Refresh patches --- debian/patches-applied/026_pam_unix_passwd_unknown_user | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'debian/patches-applied/026_pam_unix_passwd_unknown_user') diff --git a/debian/patches-applied/026_pam_unix_passwd_unknown_user b/debian/patches-applied/026_pam_unix_passwd_unknown_user index 1b1aade2..99ac3f62 100644 --- a/debian/patches-applied/026_pam_unix_passwd_unknown_user +++ b/debian/patches-applied/026_pam_unix_passwd_unknown_user @@ -1,11 +1,11 @@ Description: distinguish between password manipulation failure and missing user. Author: Martin Schwenke -Index: pam.deb/modules/pam_unix/passverify.c +Index: pam/modules/pam_unix/passverify.c =================================================================== ---- pam.deb.orig/modules/pam_unix/passverify.c -+++ pam.deb/modules/pam_unix/passverify.c -@@ -719,7 +719,7 @@ +--- pam.orig/modules/pam_unix/passverify.c ++++ pam/modules/pam_unix/passverify.c +@@ -749,7 +749,7 @@ struct passwd *tmpent = NULL; struct stat st; FILE *pwfile, *opwfile; @@ -14,7 +14,7 @@ Index: pam.deb/modules/pam_unix/passverify.c int oldmask; #ifdef WITH_SELINUX security_context_t prev_context=NULL; -@@ -790,6 +790,7 @@ +@@ -820,6 +820,7 @@ tmpent->pw_passwd = assigned_passwd.charp; err = 0; @@ -22,7 +22,7 @@ Index: pam.deb/modules/pam_unix/passverify.c } if (putpwent(tmpent, pwfile)) { D(("error writing entry to password file: %m")); -@@ -832,7 +833,7 @@ +@@ -862,7 +863,7 @@ return PAM_SUCCESS; } else { unlink(PW_TMPFILE); -- cgit v1.2.3