Hello.

Starting with glibc 2.17 (eglibc 2.17), crypt() fails with
EINVAL (w/ NULL return) if the salt violates specifications.
Additionally, on FIPS-140 enabled Linux systems, DES or MD5
encrypted passwords passed to crypt() fail with EPERM (w/
NULL return).

If using glibc's crypt() or shadow's pw_encrypt(), check
return value to avoid a possible NULL pointer dereference.

Patch that addresses this issue is submitted for code
review (applies cleanly to HEAD@e6dee42e54).

--mancha

Attachment: 0001-Handle-NULL-returns-from-glibc-2.17-crypt.patch
Description: Binary data

Reply via email to