aboutsummaryrefslogtreecommitdiff
path: root/modules/pam_unix/pam_unix_passwd.c
diff options
context:
space:
mode:
authorTobias Stoeckmann <tobias@stoeckmann.org>2024-01-15 21:36:38 +0100
committerDmitry V. Levin <ldv@strace.io>2024-01-16 08:00:00 +0000
commitc25a858bb548b4eb881dabbf10aed4a08b11e973 (patch)
treed9e2ac928576a61cae27ac478b8661ef6afa7ccf /modules/pam_unix/pam_unix_passwd.c
parent7055a56794dd18f7a29e4064d7f227ac3e04709c (diff)
downloadpam-c25a858bb548b4eb881dabbf10aed4a08b11e973.tar.gz
pam-c25a858bb548b4eb881dabbf10aed4a08b11e973.tar.bz2
pam-c25a858bb548b4eb881dabbf10aed4a08b11e973.zip
pam_unix: do not allow comma as a field separator
The opasswd file shall not use comma as a separator. Enforce colon just like pam_pwhistory does as well. A comma can be part of a user name, although its usage is discouraged. If such a user exists, it could happen that stored passwords of another user are checked. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Diffstat (limited to 'modules/pam_unix/pam_unix_passwd.c')
-rw-r--r--modules/pam_unix/pam_unix_passwd.c13
1 files changed, 6 insertions, 7 deletions
diff --git a/modules/pam_unix/pam_unix_passwd.c b/modules/pam_unix/pam_unix_passwd.c
index 444d61ca..897de6ce 100644
--- a/modules/pam_unix/pam_unix_passwd.c
+++ b/modules/pam_unix/pam_unix_passwd.c
@@ -351,14 +351,13 @@ static int check_old_password(const char *forwho, const char *newpass)
return PAM_ABORT;
for (; getline(&buf, &n, opwfile) != -1; pam_overwrite_n(buf, n)) {
- if (!strncmp(buf, forwho, len) && (buf[len] == ':' ||
- buf[len] == ',')) {
+ if (!strncmp(buf, forwho, len) && buf[len] == ':') {
char *sptr;
buf[strlen(buf) - 1] = '\0';
- /* s_luser = */ strtok_r(buf, ":,", &sptr);
- /* s_uid = */ strtok_r(NULL, ":,", &sptr);
- /* s_npas = */ strtok_r(NULL, ":,", &sptr);
- s_pas = strtok_r(NULL, ":,", &sptr);
+ /* s_luser = */ strtok_r(buf, ":", &sptr);
+ /* s_uid = */ strtok_r(NULL, ":", &sptr);
+ /* s_npas = */ strtok_r(NULL, ":", &sptr);
+ s_pas = strtok_r(NULL, ",", &sptr);
while (s_pas != NULL) {
char *md5pass = Goodcrypt_md5(newpass, s_pas);
if (md5pass == NULL || !strcmp(md5pass, s_pas)) {
@@ -366,7 +365,7 @@ static int check_old_password(const char *forwho, const char *newpass)
retval = PAM_AUTHTOK_ERR;
break;
}
- s_pas = strtok_r(NULL, ":,", &sptr);
+ s_pas = strtok_r(NULL, ",", &sptr);
_pam_delete(md5pass);
}
break;