Blame SOURCES/0001-CVE-2022-24407-Escape-password-for-SQL-insert-update.patch

8b8af0
From 37f2e0f0658d78a1496dc277f402f8b577ce6aae Mon Sep 17 00:00:00 2001
8b8af0
From: Klaus Espenlaub <klaus@espenlaub.com>
8b8af0
Date: Tue, 8 Feb 2022 20:34:40 +0000
8b8af0
Subject: [PATCH] CVE-2022-24407 Escape password for SQL insert/update
8b8af0
 commands.
8b8af0
8b8af0
Signed-off-by: Klaus Espenlaub <klaus@espenlaub.com>
8b8af0
---
8b8af0
 plugins/sql.c | 26 +++++++++++++++++++++++---
8b8af0
 1 file changed, 23 insertions(+), 3 deletions(-)
8b8af0
8b8af0
diff --git a/plugins/sql.c b/plugins/sql.c
8b8af0
index 31b54a78..6ac81c2f 100644
8b8af0
--- a/plugins/sql.c
8b8af0
+++ b/plugins/sql.c
8b8af0
@@ -1151,6 +1151,7 @@ static int sql_auxprop_store(void *glob_context,
8b8af0
     char *statement = NULL;
8b8af0
     char *escap_userid = NULL;
8b8af0
     char *escap_realm = NULL;
8b8af0
+    char *escap_passwd = NULL;
8b8af0
     const char *cmd;
8b8af0
     
8b8af0
     sql_settings_t *settings;
8b8af0
@@ -1222,6 +1223,11 @@ static int sql_auxprop_store(void *glob_context,
8b8af0
 			    "Unable to begin transaction\n");
8b8af0
     }
8b8af0
     for (cur = to_store; ret == SASL_OK && cur->name; cur++) {
8b8af0
+	/* Free the buffer, current content is from previous loop. */
8b8af0
+	if (escap_passwd) {
8b8af0
+	    sparams->utils->free(escap_passwd);
8b8af0
+	    escap_passwd = NULL;
8b8af0
+	}
8b8af0
 
8b8af0
 	if (cur->name[0] == '*') {
8b8af0
 	    continue;
8b8af0
@@ -1243,19 +1249,32 @@ static int sql_auxprop_store(void *glob_context,
8b8af0
 	}
8b8af0
 	sparams->utils->free(statement);
8b8af0
 
8b8af0
+	if (cur->values[0]) {
8b8af0
+	    escap_passwd = (char *)sparams->utils->malloc(strlen(cur->values[0])*2+1);
8b8af0
+	    if (!escap_passwd) {
8b8af0
+		ret = SASL_NOMEM;
8b8af0
+		break;
8b8af0
+	    }
8b8af0
+	    settings->sql_engine->sql_escape_str(escap_passwd, cur->values[0]);
8b8af0
+	}
8b8af0
+
8b8af0
 	/* create a statement that we will use */
8b8af0
 	statement = sql_create_statement(cmd, cur->name, escap_userid,
8b8af0
 					 escap_realm,
8b8af0
-					 cur->values && cur->values[0] ?
8b8af0
-					 cur->values[0] : SQL_NULL_VALUE,
8b8af0
+					 escap_passwd ?
8b8af0
+					 escap_passwd : SQL_NULL_VALUE,
8b8af0
 					 sparams->utils);
8b8af0
+	if (!statement) {
8b8af0
+	    ret = SASL_NOMEM;
8b8af0
+	    break;
8b8af0
+	}
8b8af0
 	
8b8af0
 	{
8b8af0
 	    char *log_statement =
8b8af0
 		sql_create_statement(cmd, cur->name,
8b8af0
 				     escap_userid,
8b8af0
 				     escap_realm,
8b8af0
-				     cur->values && cur->values[0] ?
8b8af0
+				     escap_passwd ?
8b8af0
 				     "<omitted>" : SQL_NULL_VALUE,
8b8af0
 				     sparams->utils);
8b8af0
 	    sparams->utils->log(sparams->utils->conn, SASL_LOG_DEBUG,
8b8af0
@@ -1288,6 +1307,7 @@ static int sql_auxprop_store(void *glob_context,
8b8af0
   done:
8b8af0
     if (escap_userid) sparams->utils->free(escap_userid);
8b8af0
     if (escap_realm) sparams->utils->free(escap_realm);
8b8af0
+    if (escap_passwd) sparams->utils->free(escap_passwd);
8b8af0
     if (conn) settings->sql_engine->sql_close(conn);
8b8af0
     if (userid) sparams->utils->free(userid);
8b8af0
     if (realm) sparams->utils->free(realm);
8b8af0
-- 
8b8af0
2.25.1
8b8af0