diff options
author | Ming Liu <ming.liu@windriver.com> | 2013-07-18 10:04:22 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-07-24 11:35:33 +0100 |
commit | 784d7b77294ae8066ff0ac91f7fc90f9795d2bd7 (patch) | |
tree | 1a101aca6397782d00d0cfd9b2860d243bb3a5c3 /meta/recipes-extended/lighttpd | |
parent | 7af92f8fa3a12fc8fcb22dbd12f87d89768b2d39 (diff) | |
download | poky-784d7b77294ae8066ff0ac91f7fc90f9795d2bd7.tar.gz |
libpam: add a new 'nullok_secure' option support to pam_unix
Debian patch to add a new 'nullok_secure' option to pam_unix, which
accepts users with null passwords only when the applicant is connected
from a tty listed in /etc/securetty.
The original pam_unix.so was configured with nullok_secure in
meta/recipes-extended/pam/libpam/pam.d/common-auth, but no such code
exists actually.
The patch set comes from:
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/054_pam_security_abstract_securetty_handling
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/055_pam_unix_nullok_secure
(From OE-Core rev: 10cdd66fe800cffe3f2cbf5c95550b4f7902a311)
Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/lighttpd')
0 files changed, 0 insertions, 0 deletions