Репозитории ALT
5.1: | 1.1.3-alt0.M51.1 |
4.1: | 1.0.1-alt1 |
4.0: | 0.99.6.3-alt2 |
3.0: | 0.75-alt29 |
Группа :: Система/Основа
Пакет: pam
Главная Изменения Спек Патчи Sources Загрузить Gear Bugs and FR Repocop
Патч: Linux-PAM-0.99.6.2-alt-pam_xauth-wildcards.patch
Скачать
Скачать
--- Linux-PAM-0.99.6.2.orig/modules/pam_xauth/README
+++ Linux-PAM-0.99.6.2/modules/pam_xauth/README
@@ -35,8 +35,8 @@ is not root, the user will forward cooki
/.xauth/export file, and the invoking user is root, the user will not forward
cookies to other users.
-Both the import and export files support wildcards (such as *). Both the import
-and export files can be empty, signifying that no users are allowed.
+Both the import and export files can be empty, signifying that no users
+are allowed.
OPTIONS
--- Linux-PAM-0.99.6.2.orig/modules/pam_xauth/pam_xauth.8
+++ Linux-PAM-0.99.6.2/modules/pam_xauth/pam_xauth.8
@@ -55,8 +55,7 @@ file, and the invoking user is
\fInot\fR
forward cookies to other users.
.PP
-Both the import and export files support wildcards (such as
-\fI*\fR). Both the import and export files can be empty, signifying that no users are allowed.
+Both the import and export files can be empty, signifying that no users are allowed.
.SH "OPTIONS"
.TP 3n
\fBdebug\fR
--- Linux-PAM-0.99.6.2.orig/modules/pam_xauth/pam_xauth.8.xml
+++ Linux-PAM-0.99.6.2/modules/pam_xauth/pam_xauth.8.xml
@@ -88,9 +88,8 @@
other users.
</para>
<para>
- Both the import and export files support wildcards (such as
- <emphasis remap='I'>*</emphasis>). Both the import and export files
- can be empty, signifying that no users are allowed.
+ Both the import and export files can be empty, signifying that no
+ users are allowed.
</para>
</refsect1>
--- Linux-PAM-0.99.6.2.orig/modules/pam_xauth/pam_xauth.c
+++ Linux-PAM-0.99.6.2/modules/pam_xauth/pam_xauth.c
@@ -38,7 +38,6 @@ #include <sys/types.h>
#include <sys/fsuid.h>
#include <sys/wait.h>
#include <errno.h>
-#include <fnmatch.h>
#include <grp.h>
#include <limits.h>
#include <netdb.h>
@@ -236,7 +235,7 @@ check_acl(pam_handle_t *pamh,
if (tmp != NULL) {
*tmp = '\0';
}
- if (fnmatch(buf, other_user, 0) == 0) {
+ if (strcmp(buf, other_user) == 0) {
if (debug) {
pam_syslog(pamh, LOG_DEBUG,
"%s %s allowed by %s",