diff options
author | Natanael Copa <ncopa@alpinelinux.org> | 2013-02-07 14:17:43 +0000 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2013-02-07 14:18:30 +0000 |
commit | f09c6e2fd43d639f6710c5d20861f2d2f79953c4 (patch) | |
tree | 5fdc710819469837ef2b269e2622d81d98d1650d | |
parent | 8831ae811c066a66fe5be116e059c751b20e4ee2 (diff) | |
download | aports-f09c6e2fd43d639f6710c5d20861f2d2f79953c4.tar.bz2 aports-f09c6e2fd43d639f6710c5d20861f2d2f79953c4.tar.xz |
main/pam-pgsql: backport
-rw-r--r-- | main/pam-pgsql/APKBUILD | 44 | ||||
-rw-r--r-- | main/pam-pgsql/CVE-2013-0191.patch | 11 |
2 files changed, 55 insertions, 0 deletions
diff --git a/main/pam-pgsql/APKBUILD b/main/pam-pgsql/APKBUILD new file mode 100644 index 0000000000..01443b3683 --- /dev/null +++ b/main/pam-pgsql/APKBUILD @@ -0,0 +1,44 @@ +# Contributor: Natanael Copa <ncopa@alpinelinux.org> +# Maintainer: Natanael Copa <ncopa@alpinelinux.org> +pkgname=pam-pgsql +pkgver=0.7.3.1 +pkgrel=0 +pkgdesc="PAM module to authenticate using a PostgreSQL database" +url="http://sourceforge.net/projects/pam-pgsql/" +arch="all" +license="GPL" +depends="" +depends_dev="" +makedepends="$depends_dev linux-pam-dev postgresql-dev libgcrypt-dev" +install="" +subpackages="$pkgname-doc" +source="http://downloads.sourceforge.net/project/pam-pgsql/pam-pgsql/0.7/pam-pgsql-$pkgver.tar.gz + CVE-2013-0191.patch" + +_builddir="$srcdir"/pam-pgsql-$pkgver +prepare() { + local i + cd "$_builddir" + for i in $source; do + case $i in + *.patch) msg $i; patch -p1 -i "$srcdir"/$i || return 1;; + esac + done +} + +build() { + cd "$_builddir" + ./configure --prefix=/usr \ + || return 1 + make || return 1 +} + +package() { + cd "$_builddir" + make DESTDIR="$pkgdir" install || return 1 + rm -f "$pkgdir"/usr/lib/*.la "$pkgdir"/usr/lib/security/*.la \ + || return 1 +} + +md5sums="16cb40a16ee1f286906a0d5a90254731 pam-pgsql-0.7.3.1.tar.gz +4a8640edb8eaee4456fa91ad8c22ab7f CVE-2013-0191.patch" diff --git a/main/pam-pgsql/CVE-2013-0191.patch b/main/pam-pgsql/CVE-2013-0191.patch new file mode 100644 index 0000000000..d03fc30822 --- /dev/null +++ b/main/pam-pgsql/CVE-2013-0191.patch @@ -0,0 +1,11 @@ +--- ./src/backend_pgsql.c.orig 2013-02-07 13:06:48.982679657 +0000 ++++ ./src/backend_pgsql.c 2013-02-07 13:09:00.973830056 +0000 +@@ -258,7 +258,7 @@ + if(pg_execParam(conn, &res, options->query_auth, service, user, passwd, rhost) == PAM_SUCCESS) { + if(PQntuples(res) == 0) { + rc = PAM_USER_UNKNOWN; +- } else { ++ } else if (!PQgetisnull(res, 0, 0)) { + char *stored_pw = PQgetvalue(res, 0, 0); + if (!strcmp(stored_pw, (tmp = password_encrypt(options, user, passwd, stored_pw)))) rc = PAM_SUCCESS; + free (tmp); |