severity 360657 important tags 360657 -security thanks On Mon, Apr 03, 2006 at 04:25:17PM -0600, dann frazier wrote: > reassign 360657 libpam0g > tag 360657 + patch > found 360657 0.79-3.1 > stop
> This patch works for me... > --- pam-0.79/Linux-PAM/modules/pam_unix/pam_unix_passwd.c.orig > 2006-04-03 16:06:46.000000000 -0600 > +++ pam-0.79/Linux-PAM/modules/pam_unix/pam_unix_passwd.c 2006-04-03 > 16:05:39.000000000 -0600 > @@ -1121,7 +1121,7 @@ > * password is acceptable. > */ > > - if (pass_new[0] == '\0') { /* "\0" password = NULL > */ > + if (pass_new && pass_new[0] == '\0') { /* "\0" > password = NULL */ > pass_new = NULL; > } > retval = _pam_unix_approve_pass(pamh, ctrl, pass_old, > pass_new); Thanks, Dann. FWIW, I don't see any way for a null dereference to be an exploitable security hole, so I'm downgrading this bug and removing the "security" tag. Cheers, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/
signature.asc
Description: Digital signature