Blame SOURCES/ntp-4.2.6p5-cve-2016-1550.patch
|
|
2b78f7 |
diff -up ntp-4.2.6p5/libntp/a_md5encrypt.c.cve-2016-1550 ntp-4.2.6p5/libntp/a_md5encrypt.c
|
|
|
2b78f7 |
--- ntp-4.2.6p5/libntp/a_md5encrypt.c.cve-2016-1550 2016-04-27 15:11:40.955168086 +0200
|
|
|
2b78f7 |
+++ ntp-4.2.6p5/libntp/a_md5encrypt.c 2016-04-27 15:13:41.126499861 +0200
|
|
|
2b78f7 |
@@ -88,7 +88,7 @@ MD5authdecrypt(
|
|
|
2b78f7 |
"MAC decrypt: MAC length error");
|
|
|
2b78f7 |
return (0);
|
|
|
2b78f7 |
}
|
|
|
2b78f7 |
- return (!memcmp(digest, (char *)pkt + length + 4, len));
|
|
|
2b78f7 |
+ return (!CRYPTO_memcmp(digest, (char *)pkt + length + 4, len));
|
|
|
2b78f7 |
}
|
|
|
2b78f7 |
|
|
|
2b78f7 |
/*
|
|
|
2b78f7 |
diff -up ntp-4.2.6p5/sntp/crypto.c.cve-2016-1550 ntp-4.2.6p5/sntp/crypto.c
|
|
|
2b78f7 |
--- ntp-4.2.6p5/sntp/crypto.c.cve-2016-1550 2010-11-14 09:47:00.000000000 +0100
|
|
|
2b78f7 |
+++ ntp-4.2.6p5/sntp/crypto.c 2016-04-27 15:13:41.126499861 +0200
|
|
|
2b78f7 |
@@ -58,7 +58,7 @@ auth_md5(
|
|
|
2b78f7 |
if (!hash_len)
|
|
|
2b78f7 |
authentic = FALSE;
|
|
|
2b78f7 |
else
|
|
|
2b78f7 |
- authentic = !memcmp(digest, pkt_data + pkt_size + 4,
|
|
|
2b78f7 |
+ authentic = !CRYPTO_memcmp(digest, pkt_data + pkt_size + 4,
|
|
|
2b78f7 |
hash_len);
|
|
|
2b78f7 |
return authentic;
|
|
|
2b78f7 |
}
|