Message ID | 20210824212810.1311202-1-adolf.belka@ipfire.org |
---|---|
State | Superseded |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4GvMfW5lGNz3xJJ for <patchwork@web04.haj.ipfire.org>; Tue, 24 Aug 2021 21:28:19 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4GvMfT54Swz2gN; Tue, 24 Aug 2021 21:28:17 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4GvMfT3B7Zz2xxK; Tue, 24 Aug 2021 21:28:17 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4GvMfS6kyqz2xWY for <development@lists.ipfire.org>; Tue, 24 Aug 2021 21:28:16 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4GvMfS34cTzMj; Tue, 24 Aug 2021 21:28:16 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1629840496; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ydOaQhag5DxNeahEmCodC1UFRer9qzu04FLWxPIddnM=; b=Z61LxUbw68ZQ3zvZq6fD8/w6xfm4IQa84zdhqhLyYkdnfD1grSLWRGLyWO4TLdiFdkTMSd 3VoCcz4y4wkX9GCg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1629840496; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ydOaQhag5DxNeahEmCodC1UFRer9qzu04FLWxPIddnM=; b=bNNnp3U0sSldb9UqGyPfBPuoRztcjsTK5vw2sfSFA3LdnkkRi+HXGCHMODVbMUEbMgXljX +dPG+1ddW0BhDLD3p+H8zVY2v/ye218HzN4QOjMbWV2ZBdpqAB9OgdjwN6gSb3JbtH2SOu vhuW398EUtNWowN7GTptACoKjMXva32yLT02ptZ/QHVqwxOq/IEIbksht0onR/nIUaFg6l QI11kVgDRXWIqjGz9BBKJtXlFKQt9MPYK0S1xJJcg2+nZopxVCPO8I3uS4T3aR9RGicDUI D9I6KrESaP/ZLwmp65U/0nc2qcoot73awO7IKPKOkrZ+6GtZzuMEQESIVZKSkQ== From: Adolf Belka <adolf.belka@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH] libxcrypt: Update to version 4.4.25 Date: Tue, 24 Aug 2021 23:28:10 +0200 Message-Id: <20210824212810.1311202-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <https://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <https://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Series |
libxcrypt: Update to version 4.4.25
|
|
Commit Message
Adolf Belka
Aug. 24, 2021, 9:28 p.m. UTC
- Update from 4.4.23 to 4.4.25
- Update of rootfile not required
- Changelog
Version 4.4.25
* Add support for Python 3.11 in the configure script.
* Stricter checking of invalid salt characters (issue #135).
Hashed passphrases are always entirely printable ASCII, and do
not contain any whitespace or the characters ':', ';', '*', '!',
or '\'. (These characters are used as delimiters and special
markers in the passwd(5) and shadow(5) files.)
Version 4.4.24
* Add hash group for Debian in lib/hashes.conf.
Debian has switched to use the yescrypt hashing algorithm as
the default for new user passwords, so we should add a group
for this distribution.
* Overhaul the badsalt test.
Test patterns are now mostly generated rather than manually coded
into a big table. Not reading past the end of the “setting” part
of the string is tested more thoroughly (this would have caught the
sunmd5 $$ bug if it had been available at the time).
Test logs are tidier.
* Add ‘test-programs’ utility target to Makefile.
It is sometimes useful to compile all the test programs but not run
them. Add a Makefile target that does this.
* Fix incorrect bcrypt-related ifdeffage in test/badsalt.c.
The four variants of bcrypt are independently configurable, but the
badsalt tests for them were all being toggled by INCLUDE_bcrypt,
which is only the macro for the $2b$ variant.
* Fix bigcrypt-related test cases in test/badsalt.c.
The test spec was only correct when both or neither of bigcrypt and
descrypt were enabled.
* Detect ASan in configure and disable incompatible tests.
ASan’s “interceptors” for crypt and crypt_r have a semantic conflict
with libxcrypt, requiring a few tests to be disabled for builds with
-fsanitize-address. See commentary in test/crypt-badargs.c for an
explanation of the conflict, and the commentary in
build-aux/zw_detect_asan.m4 for why a configure test is required.
* Fix several issues found by Covscan in the testsuite. These include:
- CWE-170: String not null terminated (STRING_NULL)
- CWE-188: Reliance on integer endianness (INCOMPATIBLE_CAST)
- CWE-190: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
- CWE-569: Wrong sizeof argument (SIZEOF_MISMATCH)
- CWE-573: Missing varargs init or cleanup (VARARGS)
- CWE-687: Argument cannot be negative (NEGATIVE_RETURNS)
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
---
lfs/libxcrypt | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Comments
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org> > On 24 Aug 2021, at 22:28, Adolf Belka <adolf.belka@ipfire.org> wrote: > > - Update from 4.4.23 to 4.4.25 > - Update of rootfile not required > - Changelog > Version 4.4.25 > * Add support for Python 3.11 in the configure script. > * Stricter checking of invalid salt characters (issue #135). > Hashed passphrases are always entirely printable ASCII, and do > not contain any whitespace or the characters ':', ';', '*', '!', > or '\'. (These characters are used as delimiters and special > markers in the passwd(5) and shadow(5) files.) > Version 4.4.24 > * Add hash group for Debian in lib/hashes.conf. > Debian has switched to use the yescrypt hashing algorithm as > the default for new user passwords, so we should add a group > for this distribution. > * Overhaul the badsalt test. > Test patterns are now mostly generated rather than manually coded > into a big table. Not reading past the end of the “setting” part > of the string is tested more thoroughly (this would have caught the > sunmd5 $$ bug if it had been available at the time). > Test logs are tidier. > * Add ‘test-programs’ utility target to Makefile. > It is sometimes useful to compile all the test programs but not run > them. Add a Makefile target that does this. > * Fix incorrect bcrypt-related ifdeffage in test/badsalt.c. > The four variants of bcrypt are independently configurable, but the > badsalt tests for them were all being toggled by INCLUDE_bcrypt, > which is only the macro for the $2b$ variant. > * Fix bigcrypt-related test cases in test/badsalt.c. > The test spec was only correct when both or neither of bigcrypt and > descrypt were enabled. > * Detect ASan in configure and disable incompatible tests. > ASan’s “interceptors” for crypt and crypt_r have a semantic conflict > with libxcrypt, requiring a few tests to be disabled for builds with > -fsanitize-address. See commentary in test/crypt-badargs.c for an > explanation of the conflict, and the commentary in > build-aux/zw_detect_asan.m4 for why a configure test is required. > * Fix several issues found by Covscan in the testsuite. These include: > - CWE-170: String not null terminated (STRING_NULL) > - CWE-188: Reliance on integer endianness (INCOMPATIBLE_CAST) > - CWE-190: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN) > - CWE-569: Wrong sizeof argument (SIZEOF_MISMATCH) > - CWE-573: Missing varargs init or cleanup (VARARGS) > - CWE-687: Argument cannot be negative (NEGATIVE_RETURNS) > > Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> > --- > lfs/libxcrypt | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/lfs/libxcrypt b/lfs/libxcrypt > index 16ebb1dc5..f2fd7f331 100644 > --- a/lfs/libxcrypt > +++ b/lfs/libxcrypt > @@ -24,7 +24,7 @@ > > include Config > > -VER = 4.4.23 > +VER = 4.4.25 > > THISAPP = libxcrypt-$(VER) > DL_FILE = $(THISAPP).tar.gz > @@ -47,7 +47,7 @@ objects = $(DL_FILE) > > $(DL_FILE) = $(DL_FROM)/$(DL_FILE) > > -$(DL_FILE)_MD5 = 405116b5cc90b72216afccc54025afbc > +$(DL_FILE)_MD5 = 4828b1530f5bf35af0b45b35acc4db1d > > install : $(TARGET) > > -- > 2.33.0 >
diff --git a/lfs/libxcrypt b/lfs/libxcrypt index 16ebb1dc5..f2fd7f331 100644 --- a/lfs/libxcrypt +++ b/lfs/libxcrypt @@ -24,7 +24,7 @@ include Config -VER = 4.4.23 +VER = 4.4.25 THISAPP = libxcrypt-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -47,7 +47,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = 405116b5cc90b72216afccc54025afbc +$(DL_FILE)_MD5 = 4828b1530f5bf35af0b45b35acc4db1d install : $(TARGET)