diff options
author | Ming Liu <ming.liu@windriver.com> | 2013-07-18 10:04:22 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-07-24 11:35:33 +0100 |
commit | 784d7b77294ae8066ff0ac91f7fc90f9795d2bd7 (patch) | |
tree | 1a101aca6397782d00d0cfd9b2860d243bb3a5c3 /meta/recipes-extended/pam/libpam_1.1.6.bb | |
parent | 7af92f8fa3a12fc8fcb22dbd12f87d89768b2d39 (diff) | |
download | poky-784d7b77294ae8066ff0ac91f7fc90f9795d2bd7.tar.gz |
libpam: add a new 'nullok_secure' option support to pam_unix
Debian patch to add a new 'nullok_secure' option to pam_unix, which
accepts users with null passwords only when the applicant is connected
from a tty listed in /etc/securetty.
The original pam_unix.so was configured with nullok_secure in
meta/recipes-extended/pam/libpam/pam.d/common-auth, but no such code
exists actually.
The patch set comes from:
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/054_pam_security_abstract_securetty_handling
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/055_pam_unix_nullok_secure
(From OE-Core rev: 10cdd66fe800cffe3f2cbf5c95550b4f7902a311)
Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/pam/libpam_1.1.6.bb')
-rw-r--r-- | meta/recipes-extended/pam/libpam_1.1.6.bb | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/meta/recipes-extended/pam/libpam_1.1.6.bb b/meta/recipes-extended/pam/libpam_1.1.6.bb index 62ad7b16a2..3d8999de41 100644 --- a/meta/recipes-extended/pam/libpam_1.1.6.bb +++ b/meta/recipes-extended/pam/libpam_1.1.6.bb | |||
@@ -23,6 +23,8 @@ SRC_URI = "http://linux-pam.org/library/Linux-PAM-${PV}.tar.bz2 \ | |||
23 | file://reflect-the-enforce_for_root-semantics-change-in-pam.patch \ | 23 | file://reflect-the-enforce_for_root-semantics-change-in-pam.patch \ |
24 | file://add-checks-for-crypt-returning-NULL.patch \ | 24 | file://add-checks-for-crypt-returning-NULL.patch \ |
25 | file://libpam-fix-for-CVE-2010-4708.patch \ | 25 | file://libpam-fix-for-CVE-2010-4708.patch \ |
26 | file://pam-security-abstract-securetty-handling.patch \ | ||
27 | file://pam-unix-nullok-secure.patch \ | ||
26 | " | 28 | " |
27 | SRC_URI[md5sum] = "7b73e58b7ce79ffa321d408de06db2c4" | 29 | SRC_URI[md5sum] = "7b73e58b7ce79ffa321d408de06db2c4" |
28 | SRC_URI[sha256sum] = "bab887d6280f47fc3963df3b95735a27a16f0f663636163ddf3acab5f1149fc2" | 30 | SRC_URI[sha256sum] = "bab887d6280f47fc3963df3b95735a27a16f0f663636163ddf3acab5f1149fc2" |
@@ -39,7 +41,7 @@ EXTRA_OECONF = "--with-db-uniquename=_pam \ | |||
39 | 41 | ||
40 | CFLAGS_append = " -fPIC " | 42 | CFLAGS_append = " -fPIC " |
41 | 43 | ||
42 | PR = "r2" | 44 | PR = "r3" |
43 | 45 | ||
44 | S = "${WORKDIR}/Linux-PAM-${PV}" | 46 | S = "${WORKDIR}/Linux-PAM-${PV}" |
45 | 47 | ||