severity 360657 important
tags 360657 -security
thanks

On Mon, Apr 03, 2006 at 04:25:17PM -0600, dann frazier wrote:
> reassign 360657 libpam0g
> tag 360657 + patch
> found 360657 0.79-3.1
> stop

> This patch works for me...

> --- pam-0.79/Linux-PAM/modules/pam_unix/pam_unix_passwd.c.orig        
> 2006-04-03 16:06:46.000000000 -0600
> +++ pam-0.79/Linux-PAM/modules/pam_unix/pam_unix_passwd.c     2006-04-03 
> 16:05:39.000000000 -0600
> @@ -1121,7 +1121,7 @@
>                        * password is acceptable.
>                        */
>  
> -                     if (pass_new[0] == '\0') {      /* "\0" password = NULL 
> */
> +                     if (pass_new && pass_new[0] == '\0') {  /* "\0" 
> password = NULL */
>                               pass_new = NULL;
>                       }
>                       retval = _pam_unix_approve_pass(pamh, ctrl, pass_old, 
> pass_new);

Thanks, Dann.  FWIW, I don't see any way for a null dereference to be an
exploitable security hole, so I'm downgrading this bug and removing the
"security" tag.

Cheers,
-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
[EMAIL PROTECTED]                                   http://www.debian.org/

Attachment: signature.asc
Description: Digital signature

Reply via email to