summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/pam/libpam_1.1.6.bb
diff options
context:
space:
mode:
authorMing Liu <ming.liu@windriver.com>2013-07-18 10:04:22 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-07-24 11:35:33 +0100
commit784d7b77294ae8066ff0ac91f7fc90f9795d2bd7 (patch)
tree1a101aca6397782d00d0cfd9b2860d243bb3a5c3 /meta/recipes-extended/pam/libpam_1.1.6.bb
parent7af92f8fa3a12fc8fcb22dbd12f87d89768b2d39 (diff)
downloadpoky-784d7b77294ae8066ff0ac91f7fc90f9795d2bd7.tar.gz
libpam: add a new 'nullok_secure' option support to pam_unix
Debian patch to add a new 'nullok_secure' option to pam_unix, which accepts users with null passwords only when the applicant is connected from a tty listed in /etc/securetty. The original pam_unix.so was configured with nullok_secure in meta/recipes-extended/pam/libpam/pam.d/common-auth, but no such code exists actually. The patch set comes from: http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/054_pam_security_abstract_securetty_handling http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/055_pam_unix_nullok_secure (From OE-Core rev: 10cdd66fe800cffe3f2cbf5c95550b4f7902a311) Signed-off-by: Ming Liu <ming.liu@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/pam/libpam_1.1.6.bb')
-rw-r--r--meta/recipes-extended/pam/libpam_1.1.6.bb4
1 files changed, 3 insertions, 1 deletions
diff --git a/meta/recipes-extended/pam/libpam_1.1.6.bb b/meta/recipes-extended/pam/libpam_1.1.6.bb
index 62ad7b16a2..3d8999de41 100644
--- a/meta/recipes-extended/pam/libpam_1.1.6.bb
+++ b/meta/recipes-extended/pam/libpam_1.1.6.bb
@@ -23,6 +23,8 @@ SRC_URI = "http://linux-pam.org/library/Linux-PAM-${PV}.tar.bz2 \
23 file://reflect-the-enforce_for_root-semantics-change-in-pam.patch \ 23 file://reflect-the-enforce_for_root-semantics-change-in-pam.patch \
24 file://add-checks-for-crypt-returning-NULL.patch \ 24 file://add-checks-for-crypt-returning-NULL.patch \
25 file://libpam-fix-for-CVE-2010-4708.patch \ 25 file://libpam-fix-for-CVE-2010-4708.patch \
26 file://pam-security-abstract-securetty-handling.patch \
27 file://pam-unix-nullok-secure.patch \
26 " 28 "
27SRC_URI[md5sum] = "7b73e58b7ce79ffa321d408de06db2c4" 29SRC_URI[md5sum] = "7b73e58b7ce79ffa321d408de06db2c4"
28SRC_URI[sha256sum] = "bab887d6280f47fc3963df3b95735a27a16f0f663636163ddf3acab5f1149fc2" 30SRC_URI[sha256sum] = "bab887d6280f47fc3963df3b95735a27a16f0f663636163ddf3acab5f1149fc2"
@@ -39,7 +41,7 @@ EXTRA_OECONF = "--with-db-uniquename=_pam \
39 41
40CFLAGS_append = " -fPIC " 42CFLAGS_append = " -fPIC "
41 43
42PR = "r2" 44PR = "r3"
43 45
44S = "${WORKDIR}/Linux-PAM-${PV}" 46S = "${WORKDIR}/Linux-PAM-${PV}"
45 47