aboutsummaryrefslogtreecommitdiff
path: root/debian/patches/026_pam_unix_passwd_unknown_user
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches/026_pam_unix_passwd_unknown_user')
-rw-r--r--debian/patches/026_pam_unix_passwd_unknown_user38
1 files changed, 0 insertions, 38 deletions
diff --git a/debian/patches/026_pam_unix_passwd_unknown_user b/debian/patches/026_pam_unix_passwd_unknown_user
deleted file mode 100644
index 45967e1d..00000000
--- a/debian/patches/026_pam_unix_passwd_unknown_user
+++ /dev/null
@@ -1,38 +0,0 @@
-From: Martin Schwenke <martin@meltin.net>
-Date: Mon, 11 Sep 2023 14:00:42 -0600
-Subject: distinguish between password manipulation failure and missing user.
-
----
- modules/pam_unix/passverify.c | 5 +++--
- 1 file changed, 3 insertions(+), 2 deletions(-)
-
-diff --git a/modules/pam_unix/passverify.c b/modules/pam_unix/passverify.c
-index 81b10d8..7ff8bf0 100644
---- a/modules/pam_unix/passverify.c
-+++ b/modules/pam_unix/passverify.c
-@@ -804,7 +804,7 @@ PAMH_ARG_DECL(int unix_update_passwd,
- struct passwd *tmpent = NULL;
- struct stat st;
- FILE *pwfile, *opwfile;
-- int err = 1;
-+ int err = 1, found = 0;
- int oldmask;
- #ifdef WITH_SELINUX
- char *prev_context_raw = NULL;
-@@ -875,6 +875,7 @@ PAMH_ARG_DECL(int unix_update_passwd,
-
- tmpent->pw_passwd = assigned_passwd.charp;
- err = 0;
-+ found = 1;
- }
- if (putpwent(tmpent, pwfile)) {
- D(("error writing entry to password file: %m"));
-@@ -917,7 +918,7 @@ done:
- return PAM_SUCCESS;
- } else {
- unlink(PW_TMPFILE);
-- return PAM_AUTHTOK_ERR;
-+ return found ? PAM_AUTHTOK_ERR : PAM_USER_UNKNOWN;
- }
- }
-