diff options
author | Sam Hartman <hartmans@debian.org> | 2021-08-26 12:43:23 -0700 |
---|---|---|
committer | Sam Hartman <hartmans@debian.org> | 2021-08-26 12:43:23 -0700 |
commit | 1d37a5c06c9b6f4eb60c99daccfaebe3b2bf77aa (patch) | |
tree | 1be72cc3e88b08cb714b9cd4a2dc4ec210f62c96 /debian/patches-applied/pam_unix_fix_sgid_shadow_auth.patch | |
parent | ea04efa24985743014da9dd22c0581cbaef82ede (diff) | |
parent | 58476aa622ff2f622719b2cb1c586e4a93b5a801 (diff) | |
download | pam-1d37a5c06c9b6f4eb60c99daccfaebe3b2bf77aa.tar.gz pam-1d37a5c06c9b6f4eb60c99daccfaebe3b2bf77aa.tar.bz2 pam-1d37a5c06c9b6f4eb60c99daccfaebe3b2bf77aa.zip |
pam (1.4.0-10) unstable; urgency=medium
* Fix syntax error in libpam0g.postinst when a systemd unit fails,
Closes: #992538
* Include upstream patch not to use crypt_checksalt; without this
passwords set prior to bullseye were considered expired, Closes:
#992848
* Support DPKG_ROOT for pam-auth-update, thanks Johannes 'josch' Schauer
Closes: #983427
[dgit import unpatched pam 1.4.0-10]
Diffstat (limited to 'debian/patches-applied/pam_unix_fix_sgid_shadow_auth.patch')
-rw-r--r-- | debian/patches-applied/pam_unix_fix_sgid_shadow_auth.patch | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/debian/patches-applied/pam_unix_fix_sgid_shadow_auth.patch b/debian/patches-applied/pam_unix_fix_sgid_shadow_auth.patch new file mode 100644 index 00000000..0ce85eb7 --- /dev/null +++ b/debian/patches-applied/pam_unix_fix_sgid_shadow_auth.patch @@ -0,0 +1,25 @@ +Revert upstream change that prevents pam_unix from working with sgid +shadow applications. + +Authors: Steve Langasek <vorlon@debian.org> + +Upstream status: to be submitted (and debated...) + +Index: pam/modules/pam_unix/passverify.c +=================================================================== +--- pam.orig/modules/pam_unix/passverify.c ++++ pam/modules/pam_unix/passverify.c +@@ -198,11 +198,11 @@ + * ...and shadow password file entry for this user, + * if shadowing is enabled + */ ++ *spwdent = pam_modutil_getspnam(pamh, name); + #ifndef HELPER_COMPILE +- if (geteuid() || SELINUX_ENABLED) ++ if (*spwdent == NULL && (geteuid() || SELINUX_ENABLED)) + return PAM_UNIX_RUN_HELPER; + #endif +- *spwdent = pam_modutil_getspnam(pamh, name); + if (*spwdent == NULL || (*spwdent)->sp_pwdp == NULL) + return PAM_AUTHINFO_UNAVAIL; + } |