mirror of
git://slackware.nl/current.git
synced 2024-12-30 10:24:23 +01:00
c2e6d1a771
a/pam-1.6.0-x86_64-1.txz: Upgraded. pam_namespace.so: fixed a possible local denial-of-service vulnerability. For more information, see: https://seclists.org/oss-sec/2024/q1/31 https://www.cve.org/CVERecord?id=CVE-2024-22365 (* Security fix *) a/xz-5.4.6-x86_64-1.txz: Upgraded. l/python-hatchling-1.21.1-x86_64-1.txz: Upgraded.
17 lines
750 B
Diff
17 lines
750 B
Diff
Index: Linux-PAM-1.5.3/modules/pam_unix/pam_unix_passwd.c
|
|
===================================================================
|
|
--- Linux-PAM-1.5.3.orig/modules/pam_unix/pam_unix_passwd.c
|
|
+++ Linux-PAM-1.5.3/modules/pam_unix/pam_unix_passwd.c
|
|
@@ -678,12 +678,6 @@ pam_sm_chauthtok(pam_handle_t *pamh, int
|
|
return PAM_SUCCESS;
|
|
} else if (off(UNIX__IAMROOT, ctrl) ||
|
|
(on(UNIX_NIS, ctrl) && _unix_comesfromsource(pamh, user, 0, 1))) {
|
|
- /* instruct user what is happening */
|
|
- if (off(UNIX__QUIET, ctrl)) {
|
|
- retval = pam_info(pamh, _("Changing password for %s."), user);
|
|
- if (retval != PAM_SUCCESS)
|
|
- return retval;
|
|
- }
|
|
retval = pam_get_authtok(pamh, PAM_OLDAUTHTOK, &pass_old, NULL);
|
|
|
|
if (retval != PAM_SUCCESS) {
|