xdm-1.1.11-cve-2013-2179.patch 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142
  1. From 8d1eb5c74413e4c9a21f689fc106949b121c0117 Mon Sep 17 00:00:00 2001
  2. From: mancha <mancha1@hush.com>
  3. Date: Wed, 22 May 2013 14:20:26 +0000
  4. Subject: Handle NULL returns from glibc 2.17+ crypt().
  5. Starting with glibc 2.17 (eglibc 2.17), crypt() fails with EINVAL
  6. (w/ NULL return) if the salt violates specifications. Additionally,
  7. on FIPS-140 enabled Linux systems, DES/MD5-encrypted passwords
  8. passed to crypt() fail with EPERM (w/ NULL return).
  9. If using glibc's crypt(), check return value to avoid a possible
  10. NULL pointer dereference.
  11. Reviewed-by: Matthieu Herrb <matthieu@herrb.eu>
  12. Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
  13. ---
  14. diff --git a/greeter/verify.c b/greeter/verify.c
  15. index db3cb7d..b009e2b 100644
  16. --- a/greeter/verify.c
  17. +++ b/greeter/verify.c
  18. @@ -329,6 +329,7 @@ Verify (struct display *d, struct greet_info *greet, struct verify_info *verify)
  19. struct spwd *sp;
  20. # endif
  21. char *user_pass = NULL;
  22. + char *crypted_pass = NULL;
  23. # endif
  24. # ifdef __OpenBSD__
  25. char *s;
  26. @@ -464,7 +465,9 @@ Verify (struct display *d, struct greet_info *greet, struct verify_info *verify)
  27. # if defined(ultrix) || defined(__ultrix__)
  28. if (authenticate_user(p, greet->password, NULL) < 0)
  29. # else
  30. - if (strcmp (crypt (greet->password, user_pass), user_pass))
  31. + crypted_pass = crypt (greet->password, user_pass);
  32. + if ((crypted_pass == NULL)
  33. + || (strcmp (crypted_pass, user_pass)))
  34. # endif
  35. {
  36. if(!greet->allow_null_passwd || strlen(p->pw_passwd) > 0) {
  37. --
  38. cgit v0.9.0.2-2-gbebe