diff options
author | mancha <mancha1@hush.com> | 2013-06-24 09:49:55 -0500 |
---|---|---|
committer | Niels Horn <niels.horn@slackbuilds.org> | 2013-06-29 16:12:38 -0300 |
commit | 5e7435b792e3d7c0576fe39c8fe8269e311d3d50 (patch) | |
tree | d3c0b7a2f2bbaa87b59297cd06879f54aee57cd2 /system/udisks-glue | |
parent | 65f5cba659a44050e2e9b69c963e7c2f2ef57549 (diff) | |
download | slackbuilds-5e7435b792e3d7c0576fe39c8fe8269e311d3d50.tar.gz |
system/gdm: Fix crypt() usage with glibc-2.17+
Starting with glibc 2.17 (eglibc 2.17), crypt() fails with
EINVAL (w/ NULL return) if the salt violates specifications.
Additionally, on FIPS-140 enabled Linux systems, DES or MD5
encrypted passwords passed to crypt() fail with EPERM (w/
NULL return).
Slackware-current has transitioned to glibc 2.17 and as you
might be aware from reading my posts on LQ, I have dedicated
time to fixing userland which does not adequately handle
crypt() returns given the new behavior.
gdm is negatively affected and my attached patch (against
gdm 2.20.11) addresses this.
This is in anticipation of a new Slackware release but can
be applied to the SBo package for Slackware 14.0 since it is
backwards compatible and should not affect behavior on glibc
2.15. It would be good if my assertion were tested.
[rworkman] Yeah, it seems to work here :-)
Signed-off-by: Robby Workman <rworkman@slackbuilds.org>
Diffstat (limited to 'system/udisks-glue')
0 files changed, 0 insertions, 0 deletions