Hello community,

here is the log from the commit of package accountsservice for openSUSE:Factory 
checked in at 2013-10-09 14:42:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/accountsservice (Old)
 and      /work/SRC/openSUSE:Factory/.accountsservice.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "accountsservice"

Changes:
--------
--- /work/SRC/openSUSE:Factory/accountsservice/accountsservice.changes  
2013-06-25 14:38:26.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.accountsservice.new/accountsservice.changes     
2013-10-09 14:42:28.000000000 +0200
@@ -1,0 +2,7 @@
+Wed Oct  9 11:51:08 UTC 2013 - [email protected]
+
+- Add accountsservice-remotePW-verification.patch: treat NULL
+  shadow entry as "password handled remotely" (bnc#844933,
+  bgo#708997, fdo#70005).
+
+-------------------------------------------------------------------

New:
----
  accountsservice-remotePW-verification.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ accountsservice.spec ++++++
--- /var/tmp/diff_new_pack.M2ouLv/_old  2013-10-09 14:42:29.000000000 +0200
+++ /var/tmp/diff_new_pack.M2ouLv/_new  2013-10-09 14:42:29.000000000 +0200
@@ -29,6 +29,8 @@
 Patch0:         accountsservice-sysconfig.patch
 # PATCH-FIX-OPENSUSE accountsservice-filter-suse-accounts.patch 
[email protected] -- Filter out some system users that are specific to openSUSE
 Patch1:         accountsservice-filter-suse-accounts.patch
+# PATCH-FIX-UPSTREAM accountsservice-remotePW-verification.patch bnc#844933 
bgo#708997 fdo#70005 [email protected] -- treat NULL shadow entry as 
"password handled remotely"
+Patch2:         accountsservice-remotePW-verification.patch
 # needed for patch0
 BuildRequires:  gnome-common
 BuildRequires:  gobject-introspection-devel
@@ -89,6 +91,7 @@
 %setup -q
 %patch0 -p1
 %patch1 -p1
+%patch2 -p1
 
 %build
 # needed for patch0

++++++ accountsservice-remotePW-verification.patch ++++++
>From 631c57790fe79ee70d79522eb1b3e461e2899d82 Mon Sep 17 00:00:00 2001
From: Ray Strode <[email protected]>
Date: Tue, 01 Oct 2013 14:50:46 +0000
Subject: user: treat NULL shadow entry as "password handled remotely"

Right now we set the password mode of a user based on the password
hash in shadow.  SSSD (and other remote login facilities
presumably) don't send the password hash over the wire to the client,
but of course those users do have a password set.

This commit changes the code to notice when there's no shadow entry
for a user and treat that case conservatively (assume user has a password).

Related to: https://bugzilla.gnome.org/show_bug.cgi?id=708997

https://bugs.freedesktop.org/show_bug.cgi?id=70005
---
diff --git a/src/user.c b/src/user.c
index 1f28e78..76cb470 100644
--- a/src/user.c
+++ b/src/user.c
@@ -271,7 +271,7 @@ user_update_from_pwent (User          *user,
                 g_object_notify (G_OBJECT (user), "locked");
         }
 
-        if (passwd && passwd[0] != 0) {
+        if (passwd == NULL || passwd[0] != 0) {
                 mode = PASSWORD_MODE_REGULAR;
         }
         else {
--
cgit v0.9.0.2-2-gbebe

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to