Hello community, here is the log from the commit of package accountsservice for openSUSE:Factory checked in at 2013-10-09 14:42:26 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/accountsservice (Old) and /work/SRC/openSUSE:Factory/.accountsservice.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "accountsservice" Changes: -------- --- /work/SRC/openSUSE:Factory/accountsservice/accountsservice.changes 2013-06-25 14:38:26.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.accountsservice.new/accountsservice.changes 2013-10-09 14:42:28.000000000 +0200 @@ -1,0 +2,7 @@ +Wed Oct 9 11:51:08 UTC 2013 - [email protected] + +- Add accountsservice-remotePW-verification.patch: treat NULL + shadow entry as "password handled remotely" (bnc#844933, + bgo#708997, fdo#70005). + +------------------------------------------------------------------- New: ---- accountsservice-remotePW-verification.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ accountsservice.spec ++++++ --- /var/tmp/diff_new_pack.M2ouLv/_old 2013-10-09 14:42:29.000000000 +0200 +++ /var/tmp/diff_new_pack.M2ouLv/_new 2013-10-09 14:42:29.000000000 +0200 @@ -29,6 +29,8 @@ Patch0: accountsservice-sysconfig.patch # PATCH-FIX-OPENSUSE accountsservice-filter-suse-accounts.patch [email protected] -- Filter out some system users that are specific to openSUSE Patch1: accountsservice-filter-suse-accounts.patch +# PATCH-FIX-UPSTREAM accountsservice-remotePW-verification.patch bnc#844933 bgo#708997 fdo#70005 [email protected] -- treat NULL shadow entry as "password handled remotely" +Patch2: accountsservice-remotePW-verification.patch # needed for patch0 BuildRequires: gnome-common BuildRequires: gobject-introspection-devel @@ -89,6 +91,7 @@ %setup -q %patch0 -p1 %patch1 -p1 +%patch2 -p1 %build # needed for patch0 ++++++ accountsservice-remotePW-verification.patch ++++++ >From 631c57790fe79ee70d79522eb1b3e461e2899d82 Mon Sep 17 00:00:00 2001 From: Ray Strode <[email protected]> Date: Tue, 01 Oct 2013 14:50:46 +0000 Subject: user: treat NULL shadow entry as "password handled remotely" Right now we set the password mode of a user based on the password hash in shadow. SSSD (and other remote login facilities presumably) don't send the password hash over the wire to the client, but of course those users do have a password set. This commit changes the code to notice when there's no shadow entry for a user and treat that case conservatively (assume user has a password). Related to: https://bugzilla.gnome.org/show_bug.cgi?id=708997 https://bugs.freedesktop.org/show_bug.cgi?id=70005 --- diff --git a/src/user.c b/src/user.c index 1f28e78..76cb470 100644 --- a/src/user.c +++ b/src/user.c @@ -271,7 +271,7 @@ user_update_from_pwent (User *user, g_object_notify (G_OBJECT (user), "locked"); } - if (passwd && passwd[0] != 0) { + if (passwd == NULL || passwd[0] != 0) { mode = PASSWORD_MODE_REGULAR; } else { -- cgit v0.9.0.2-2-gbebe -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
