diff options
Diffstat (limited to 'debian/patches/026_pam_unix_passwd_unknown_user')
-rw-r--r-- | debian/patches/026_pam_unix_passwd_unknown_user | 38 |
1 files changed, 0 insertions, 38 deletions
diff --git a/debian/patches/026_pam_unix_passwd_unknown_user b/debian/patches/026_pam_unix_passwd_unknown_user deleted file mode 100644 index 45967e1d..00000000 --- a/debian/patches/026_pam_unix_passwd_unknown_user +++ /dev/null @@ -1,38 +0,0 @@ -From: Martin Schwenke <martin@meltin.net> -Date: Mon, 11 Sep 2023 14:00:42 -0600 -Subject: distinguish between password manipulation failure and missing user. - ---- - modules/pam_unix/passverify.c | 5 +++-- - 1 file changed, 3 insertions(+), 2 deletions(-) - -diff --git a/modules/pam_unix/passverify.c b/modules/pam_unix/passverify.c -index 81b10d8..7ff8bf0 100644 ---- a/modules/pam_unix/passverify.c -+++ b/modules/pam_unix/passverify.c -@@ -804,7 +804,7 @@ PAMH_ARG_DECL(int unix_update_passwd, - struct passwd *tmpent = NULL; - struct stat st; - FILE *pwfile, *opwfile; -- int err = 1; -+ int err = 1, found = 0; - int oldmask; - #ifdef WITH_SELINUX - char *prev_context_raw = NULL; -@@ -875,6 +875,7 @@ PAMH_ARG_DECL(int unix_update_passwd, - - tmpent->pw_passwd = assigned_passwd.charp; - err = 0; -+ found = 1; - } - if (putpwent(tmpent, pwfile)) { - D(("error writing entry to password file: %m")); -@@ -917,7 +918,7 @@ done: - return PAM_SUCCESS; - } else { - unlink(PW_TMPFILE); -- return PAM_AUTHTOK_ERR; -+ return found ? PAM_AUTHTOK_ERR : PAM_USER_UNKNOWN; - } - } - |