summaryrefslogtreecommitdiffstats
path: root/source/installer/sources/dropbear/dropbear.glibc.crypt.diff
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2018-06-21 05:18:41 +0000
committer Eric Hameleers <alien@slackware.com>2018-06-21 19:27:50 +0200
commitb893b1174dfcd0fdc84aa597eee76b797d6d7b11 (patch)
tree4680d457b726c2ad611492ff14e092446a1d983b /source/installer/sources/dropbear/dropbear.glibc.crypt.diff
parent7e5ee73de954e6c084195b0a1fa6ef01a78d092f (diff)
downloadcurrent-b893b1174dfcd0fdc84aa597eee76b797d6d7b11.tar.gz
current-b893b1174dfcd0fdc84aa597eee76b797d6d7b11.tar.xz
Thu Jun 21 05:18:41 UTC 201820180621051841
a/kernel-generic-4.14.51-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.51-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.51-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.51-x86-1.txz: Upgraded. d/parallel-20180622-noarch-1.txz: Upgraded. k/kernel-source-4.14.51-noarch-1.txz: Upgraded. l/libedit-20180525_3.1-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/installer/sources/dropbear/dropbear.glibc.crypt.diff')
-rw-r--r--source/installer/sources/dropbear/dropbear.glibc.crypt.diff28
1 files changed, 0 insertions, 28 deletions
diff --git a/source/installer/sources/dropbear/dropbear.glibc.crypt.diff b/source/installer/sources/dropbear/dropbear.glibc.crypt.diff
deleted file mode 100644
index 3184210dd..000000000
--- a/source/installer/sources/dropbear/dropbear.glibc.crypt.diff
+++ /dev/null
@@ -1,28 +0,0 @@
-
-# HG changeset patch
-# User Matt Johnston <matt@ucc.asn.au>
-# Date 1367250157 -28800
-# Node ID 7bd88d546627ff31d0e2d91e6022b3e77a943efb
-# Parent ea04e3eb03e2c3d59d82e361882711de844068a4
-Avoid segfault for locked accounts (invalid salt to crypt())
-
-diff -r ea04e3eb03e2 -r 7bd88d546627 svr-authpasswd.c
---- a/svr-authpasswd.c Thu Apr 18 23:15:17 2013 +0800
-+++ b/svr-authpasswd.c Mon Apr 29 23:42:37 2013 +0800
-@@ -66,6 +66,14 @@
- m_burn(password, passwordlen);
- m_free(password);
-
-+ if (testcrypt == NULL) {
-+ /* crypt() with an invalid salt like "!!" */
-+ dropbear_log(LOG_WARNING, "User account '%s' is locked",
-+ ses.authstate.pw_name);
-+ send_msg_userauth_failure(0, 1);
-+ return;
-+ }
-+
- /* check for empty password */
- if (passwdcrypt[0] == '\0') {
- dropbear_log(LOG_WARNING, "User '%s' has blank password, rejected",
-
-