aboutsummaryrefslogtreecommitdiff
path: root/libpam
diff options
context:
space:
mode:
authorTobias Stoeckmann <tobias@stoeckmann.org>2023-12-06 21:42:17 +0100
committerDmitry V. Levin <ldv@strace.io>2023-12-06 20:50:41 +0000
commitbde5b4c310458db8b3b8f5a15bedded184a2acff (patch)
tree3a2f7d014efd07030e912d80c0f9b14509d453fb /libpam
parentf1ed3f00e2542cac4983a4bdc3edab3ae2646ddc (diff)
downloadpam-bde5b4c310458db8b3b8f5a15bedded184a2acff.tar.gz
pam-bde5b4c310458db8b3b8f5a15bedded184a2acff.tar.bz2
pam-bde5b4c310458db8b3b8f5a15bedded184a2acff.zip
libpam: treat NUL in passwd files correctly
This already implies that the passwd file itself is broken. Yet do not skip lines by accident due to fgets limitations. As a positive side effect, arbitrarily long lines and user names are supported now as well. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Diffstat (limited to 'libpam')
-rw-r--r--libpam/pam_modutil_check_user.c55
1 files changed, 20 insertions, 35 deletions
diff --git a/libpam/pam_modutil_check_user.c b/libpam/pam_modutil_check_user.c
index cf1bd1b5..92fc74b1 100644
--- a/libpam/pam_modutil_check_user.c
+++ b/libpam/pam_modutil_check_user.c
@@ -10,22 +10,15 @@ pam_modutil_check_user_in_passwd(pam_handle_t *pamh,
const char *user_name,
const char *file_name)
{
- int rc;
- size_t user_len;
+ int rc, c = EOF;
FILE *fp;
- char line[BUFSIZ];
/* Validate the user name. */
- if ((user_len = strlen(user_name)) == 0) {
+ if (user_name[0] == '\0') {
pam_syslog(pamh, LOG_NOTICE, "user name is not valid");
return PAM_SERVICE_ERR;
}
- if (user_len > sizeof(line) - sizeof(":")) {
- pam_syslog(pamh, LOG_NOTICE, "user name is too long");
- return PAM_SERVICE_ERR;
- }
-
if (strchr(user_name, ':') != NULL) {
/*
* "root:x" is not a local user name even if the passwd file
@@ -44,48 +37,40 @@ pam_modutil_check_user_in_passwd(pam_handle_t *pamh,
}
/*
- * Scan the file using fgets() instead of fgetpwent_r() because
+ * Scan the file using fgetc() instead of fgetpwent_r() because
* the latter is not flexible enough in handling long lines
* in passwd files.
*/
rc = PAM_PERM_DENIED;
- while (fgets(line, sizeof(line), fp) != NULL) {
- size_t line_len;
- const char *str;
+ do {
+ const char *p;
/*
* Does this line start with the user name
* followed by a colon?
*/
- if (strncmp(user_name, line, user_len) == 0 &&
- line[user_len] == ':') {
+ for (p = user_name; *p != '\0'; p++) {
+ c = fgetc(fp);
+ if (c == EOF || c == '\n' || c != *p)
+ break;
+ }
+
+ if (c != EOF && c != '\n')
+ c = fgetc(fp);
+
+ if (*p == '\0' && c == ':') {
rc = PAM_SUCCESS;
/*
* Continue reading the file to avoid timing attacks.
*/
}
- /* Has a newline been read? */
- line_len = strlen(line);
- if (line_len < sizeof(line) - 1 ||
- line[line_len - 1] == '\n') {
- /* Yes, continue with the next line. */
- continue;
- }
- /* No, read till the end of this line first. */
- while ((str = fgets(line, sizeof(line), fp)) != NULL) {
- line_len = strlen(line);
- if (line_len == 0 ||
- line[line_len - 1] == '\n') {
- break;
- }
- }
- if (str == NULL) {
- /* fgets returned NULL, we are done. */
- break;
- }
+ /* Read till the end of this line. */
+ while (c != EOF && c != '\n')
+ c = fgetc(fp);
+
/* Continue with the next line. */
- }
+ } while (c != EOF);
fclose(fp);
return rc;