aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2013-02-07 14:17:43 +0000
committerNatanael Copa <ncopa@alpinelinux.org>2013-02-07 14:18:30 +0000
commitf09c6e2fd43d639f6710c5d20861f2d2f79953c4 (patch)
tree5fdc710819469837ef2b269e2622d81d98d1650d
parent8831ae811c066a66fe5be116e059c751b20e4ee2 (diff)
downloadaports-f09c6e2fd43d639f6710c5d20861f2d2f79953c4.tar.bz2
aports-f09c6e2fd43d639f6710c5d20861f2d2f79953c4.tar.xz
main/pam-pgsql: backport
-rw-r--r--main/pam-pgsql/APKBUILD44
-rw-r--r--main/pam-pgsql/CVE-2013-0191.patch11
2 files changed, 55 insertions, 0 deletions
diff --git a/main/pam-pgsql/APKBUILD b/main/pam-pgsql/APKBUILD
new file mode 100644
index 0000000000..01443b3683
--- /dev/null
+++ b/main/pam-pgsql/APKBUILD
@@ -0,0 +1,44 @@
+# Contributor: Natanael Copa <ncopa@alpinelinux.org>
+# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
+pkgname=pam-pgsql
+pkgver=0.7.3.1
+pkgrel=0
+pkgdesc="PAM module to authenticate using a PostgreSQL database"
+url="http://sourceforge.net/projects/pam-pgsql/"
+arch="all"
+license="GPL"
+depends=""
+depends_dev=""
+makedepends="$depends_dev linux-pam-dev postgresql-dev libgcrypt-dev"
+install=""
+subpackages="$pkgname-doc"
+source="http://downloads.sourceforge.net/project/pam-pgsql/pam-pgsql/0.7/pam-pgsql-$pkgver.tar.gz
+ CVE-2013-0191.patch"
+
+_builddir="$srcdir"/pam-pgsql-$pkgver
+prepare() {
+ local i
+ cd "$_builddir"
+ for i in $source; do
+ case $i in
+ *.patch) msg $i; patch -p1 -i "$srcdir"/$i || return 1;;
+ esac
+ done
+}
+
+build() {
+ cd "$_builddir"
+ ./configure --prefix=/usr \
+ || return 1
+ make || return 1
+}
+
+package() {
+ cd "$_builddir"
+ make DESTDIR="$pkgdir" install || return 1
+ rm -f "$pkgdir"/usr/lib/*.la "$pkgdir"/usr/lib/security/*.la \
+ || return 1
+}
+
+md5sums="16cb40a16ee1f286906a0d5a90254731 pam-pgsql-0.7.3.1.tar.gz
+4a8640edb8eaee4456fa91ad8c22ab7f CVE-2013-0191.patch"
diff --git a/main/pam-pgsql/CVE-2013-0191.patch b/main/pam-pgsql/CVE-2013-0191.patch
new file mode 100644
index 0000000000..d03fc30822
--- /dev/null
+++ b/main/pam-pgsql/CVE-2013-0191.patch
@@ -0,0 +1,11 @@
+--- ./src/backend_pgsql.c.orig 2013-02-07 13:06:48.982679657 +0000
++++ ./src/backend_pgsql.c 2013-02-07 13:09:00.973830056 +0000
+@@ -258,7 +258,7 @@
+ if(pg_execParam(conn, &res, options->query_auth, service, user, passwd, rhost) == PAM_SUCCESS) {
+ if(PQntuples(res) == 0) {
+ rc = PAM_USER_UNKNOWN;
+- } else {
++ } else if (!PQgetisnull(res, 0, 0)) {
+ char *stored_pw = PQgetvalue(res, 0, 0);
+ if (!strcmp(stored_pw, (tmp = password_encrypt(options, user, passwd, stored_pw)))) rc = PAM_SUCCESS;
+ free (tmp);