Hello community, here is the log from the commit of package pam_krb5 checked in at Mon Nov 3 14:16:55 CET 2008. -------- --- pam_krb5/pam_krb5.changes 2008-10-28 15:15:34.000000000 +0100 +++ /mounts/work_src_done/STABLE/pam_krb5/pam_krb5.changes 2008-10-29 11:45:34.965689000 +0100 @@ -1,0 +2,6 @@ +Wed Oct 29 11:35:39 CET 2008 - mc@suse.de + +- use the upstream fix for + pam_krb5-2.3.1-fix-pwchange-with-use_shmem.dif + +------------------------------------------------------------------- calling whatdependson for head-i586 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ pam_krb5.spec ++++++ --- /var/tmp/diff_new_pack.Vo8132/_old 2008-11-03 14:16:23.000000000 +0100 +++ /var/tmp/diff_new_pack.Vo8132/_new 2008-11-03 14:16:23.000000000 +0100 @@ -26,7 +26,7 @@ Provides: pam_krb AutoReqProv: on Version: 2.3.1 -Release: 39 +Release: 40 Summary: PAM Module for Kerberos Authentication Url: http://sourceforge.net/projects/pam-krb5/ Source: pam_krb5-%{version}-%{PAM_RELEASE}.tar.bz2 @@ -97,6 +97,9 @@ %attr(755,root,root) /usr/bin/afs5log %changelog +* Wed Oct 29 2008 mc@suse.de +- use the upstream fix for + pam_krb5-2.3.1-fix-pwchange-with-use_shmem.dif * Tue Oct 28 2008 mc@suse.de - simplify switch permissions of refresh credentials (remove pam_krb5-2.2.11-1-refresh-drop-restore-priv.dif ++++++ pam_krb5-2.3.1-fix-pwchange-with-use_shmem.dif ++++++ --- /var/tmp/diff_new_pack.Vo8132/_old 2008-11-03 14:16:24.000000000 +0100 +++ /var/tmp/diff_new_pack.Vo8132/_new 2008-11-03 14:16:24.000000000 +0100 @@ -1,15 +1,35 @@ -Index: pam_krb5-2.3.1-1/src/password.c -=================================================================== ---- pam_krb5-2.3.1-1.orig/src/password.c -+++ pam_krb5-2.3.1-1/src/password.c -@@ -465,6 +465,10 @@ pam_sm_chauthtok(pam_handle_t *pamh, int +diff --git a/src/password.c b/src/password.c +index 85ab240..5ed4cf1 100644 +--- a/src/password.c ++++ b/src/password.c +@@ -442,16 +442,22 @@ pam_sm_chauthtok(pam_handle_t *pamh, int flags, + _pam_krb5_always_fail_prompter, + &stash->v5result); + stash->v5attempted = 1; +- if ((i == PAM_SUCCESS) && +- ((options->v4 == 1) || (options->v4_for_afs == 1))) { +- v4_get_creds(ctx, pamh, stash, userinfo, +- options, password, &i); +- if (i != 0) { +- if (options->debug) { +- debug("error obtaining initial credentials using newly-set password: %d (%s)", +- i, v5_error_message(i)); ++ if (i == PAM_SUCCESS) { ++ if ((options->v4 == 1) || (options->v4_for_afs == 1)) { ++ v4_get_creds(ctx, pamh, stash, userinfo, ++ options, password, &i); ++ if (i != 0) { ++ if (options->debug) { ++ debug("error obtaining initial credentials using newly-set password: %d (%s)", ++ i, v5_error_message(i)); ++ } } } ++ if (options->use_shmem) { ++ _pam_krb5_stash_shm_write(pamh, stash, ++ options, ++ userinfo); ++ } } -+ if ((i == PAM_SUCCESS) && options->use_shmem) -+ { -+ _pam_krb5_stash_shm_write(pamh, stash, options, userinfo); -+ } } - /* Free the new password. */ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun... -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org