diff options
author | Tobias Stoeckmann <tobias@stoeckmann.org> | 2023-12-06 21:42:17 +0100 |
---|---|---|
committer | Dmitry V. Levin <ldv@strace.io> | 2023-12-06 20:50:41 +0000 |
commit | bde5b4c310458db8b3b8f5a15bedded184a2acff (patch) | |
tree | 3a2f7d014efd07030e912d80c0f9b14509d453fb /libpam | |
parent | f1ed3f00e2542cac4983a4bdc3edab3ae2646ddc (diff) | |
download | pam-bde5b4c310458db8b3b8f5a15bedded184a2acff.tar.gz pam-bde5b4c310458db8b3b8f5a15bedded184a2acff.tar.bz2 pam-bde5b4c310458db8b3b8f5a15bedded184a2acff.zip |
libpam: treat NUL in passwd files correctly
This already implies that the passwd file itself is broken. Yet do not
skip lines by accident due to fgets limitations.
As a positive side effect, arbitrarily long lines and user names are
supported now as well.
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Diffstat (limited to 'libpam')
-rw-r--r-- | libpam/pam_modutil_check_user.c | 55 |
1 files changed, 20 insertions, 35 deletions
diff --git a/libpam/pam_modutil_check_user.c b/libpam/pam_modutil_check_user.c index cf1bd1b5..92fc74b1 100644 --- a/libpam/pam_modutil_check_user.c +++ b/libpam/pam_modutil_check_user.c @@ -10,22 +10,15 @@ pam_modutil_check_user_in_passwd(pam_handle_t *pamh, const char *user_name, const char *file_name) { - int rc; - size_t user_len; + int rc, c = EOF; FILE *fp; - char line[BUFSIZ]; /* Validate the user name. */ - if ((user_len = strlen(user_name)) == 0) { + if (user_name[0] == '\0') { pam_syslog(pamh, LOG_NOTICE, "user name is not valid"); return PAM_SERVICE_ERR; } - if (user_len > sizeof(line) - sizeof(":")) { - pam_syslog(pamh, LOG_NOTICE, "user name is too long"); - return PAM_SERVICE_ERR; - } - if (strchr(user_name, ':') != NULL) { /* * "root:x" is not a local user name even if the passwd file @@ -44,48 +37,40 @@ pam_modutil_check_user_in_passwd(pam_handle_t *pamh, } /* - * Scan the file using fgets() instead of fgetpwent_r() because + * Scan the file using fgetc() instead of fgetpwent_r() because * the latter is not flexible enough in handling long lines * in passwd files. */ rc = PAM_PERM_DENIED; - while (fgets(line, sizeof(line), fp) != NULL) { - size_t line_len; - const char *str; + do { + const char *p; /* * Does this line start with the user name * followed by a colon? */ - if (strncmp(user_name, line, user_len) == 0 && - line[user_len] == ':') { + for (p = user_name; *p != '\0'; p++) { + c = fgetc(fp); + if (c == EOF || c == '\n' || c != *p) + break; + } + + if (c != EOF && c != '\n') + c = fgetc(fp); + + if (*p == '\0' && c == ':') { rc = PAM_SUCCESS; /* * Continue reading the file to avoid timing attacks. */ } - /* Has a newline been read? */ - line_len = strlen(line); - if (line_len < sizeof(line) - 1 || - line[line_len - 1] == '\n') { - /* Yes, continue with the next line. */ - continue; - } - /* No, read till the end of this line first. */ - while ((str = fgets(line, sizeof(line), fp)) != NULL) { - line_len = strlen(line); - if (line_len == 0 || - line[line_len - 1] == '\n') { - break; - } - } - if (str == NULL) { - /* fgets returned NULL, we are done. */ - break; - } + /* Read till the end of this line. */ + while (c != EOF && c != '\n') + c = fgetc(fp); + /* Continue with the next line. */ - } + } while (c != EOF); fclose(fp); return rc; |