4b110147f6
The content of this branch was automatically imported from Fedora ELN with the following as its source: https://src.fedoraproject.org/rpms/shadow-utils#9f643a301165a0b1bb1fcb7b9c425809d5791a2f
87 lines
3.1 KiB
Diff
87 lines
3.1 KiB
Diff
diff -up shadow-4.8/lib/defines.h.long-entry shadow-4.8/lib/defines.h
|
|
--- shadow-4.8/lib/defines.h.long-entry 2020-01-13 10:29:45.288957339 +0100
|
|
+++ shadow-4.8/lib/defines.h 2020-01-13 10:30:47.482902954 +0100
|
|
@@ -388,6 +388,9 @@ extern char *strerror ();
|
|
# endif
|
|
#endif
|
|
|
|
+/* Maximum length of passwd entry */
|
|
+#define PASSWD_ENTRY_MAX_LENGTH 32768
|
|
+
|
|
#ifdef HAVE_SECURE_GETENV
|
|
# define shadow_getenv(name) secure_getenv(name)
|
|
# else
|
|
diff -up shadow-4.8/lib/pwio.c.long-entry shadow-4.8/lib/pwio.c
|
|
--- shadow-4.8/lib/pwio.c.long-entry 2019-07-23 17:26:08.000000000 +0200
|
|
+++ shadow-4.8/lib/pwio.c 2020-01-13 10:29:45.288957339 +0100
|
|
@@ -79,7 +79,10 @@ static int passwd_put (const void *ent,
|
|
|| (pw->pw_gid == (gid_t)-1)
|
|
|| (valid_field (pw->pw_gecos, ":\n") == -1)
|
|
|| (valid_field (pw->pw_dir, ":\n") == -1)
|
|
- || (valid_field (pw->pw_shell, ":\n") == -1)) {
|
|
+ || (valid_field (pw->pw_shell, ":\n") == -1)
|
|
+ || (strlen (pw->pw_name) + strlen (pw->pw_passwd) +
|
|
+ strlen (pw->pw_gecos) + strlen (pw->pw_dir) +
|
|
+ strlen (pw->pw_shell) + 100 > PASSWD_ENTRY_MAX_LENGTH)) {
|
|
return -1;
|
|
}
|
|
|
|
diff -up shadow-4.8/lib/sgetpwent.c.long-entry shadow-4.8/lib/sgetpwent.c
|
|
--- shadow-4.8/lib/sgetpwent.c.long-entry 2019-10-05 03:23:58.000000000 +0200
|
|
+++ shadow-4.8/lib/sgetpwent.c 2020-01-13 10:29:45.288957339 +0100
|
|
@@ -57,7 +57,7 @@
|
|
struct passwd *sgetpwent (const char *buf)
|
|
{
|
|
static struct passwd pwent;
|
|
- static char pwdbuf[1024];
|
|
+ static char pwdbuf[PASSWD_ENTRY_MAX_LENGTH];
|
|
register int i;
|
|
register char *cp;
|
|
char *fields[NFIELDS];
|
|
@@ -67,8 +67,10 @@ struct passwd *sgetpwent (const char *bu
|
|
* the password structure remain valid.
|
|
*/
|
|
|
|
- if (strlen (buf) >= sizeof pwdbuf)
|
|
+ if (strlen (buf) >= sizeof pwdbuf) {
|
|
+ fprintf (stderr, "Too long passwd entry encountered, file corruption?\n");
|
|
return 0; /* fail if too long */
|
|
+ }
|
|
strcpy (pwdbuf, buf);
|
|
|
|
/*
|
|
diff -up shadow-4.8/lib/sgetspent.c.long-entry shadow-4.8/lib/sgetspent.c
|
|
--- shadow-4.8/lib/sgetspent.c.long-entry 2019-07-23 17:26:08.000000000 +0200
|
|
+++ shadow-4.8/lib/sgetspent.c 2020-01-13 10:29:45.289957322 +0100
|
|
@@ -48,7 +48,7 @@
|
|
*/
|
|
struct spwd *sgetspent (const char *string)
|
|
{
|
|
- static char spwbuf[1024];
|
|
+ static char spwbuf[PASSWD_ENTRY_MAX_LENGTH];
|
|
static struct spwd spwd;
|
|
char *fields[FIELDS];
|
|
char *cp;
|
|
@@ -61,6 +61,7 @@ struct spwd *sgetspent (const char *stri
|
|
*/
|
|
|
|
if (strlen (string) >= sizeof spwbuf) {
|
|
+ fprintf (stderr, "Too long shadow entry encountered, file corruption?\n");
|
|
return 0; /* fail if too long */
|
|
}
|
|
strcpy (spwbuf, string);
|
|
diff -up shadow-4.8/lib/shadowio.c.long-entry shadow-4.8/lib/shadowio.c
|
|
--- shadow-4.8/lib/shadowio.c.long-entry 2019-07-23 17:26:08.000000000 +0200
|
|
+++ shadow-4.8/lib/shadowio.c 2020-01-13 10:29:45.289957322 +0100
|
|
@@ -79,7 +79,9 @@ static int shadow_put (const void *ent,
|
|
|
|
if ( (NULL == sp)
|
|
|| (valid_field (sp->sp_namp, ":\n") == -1)
|
|
- || (valid_field (sp->sp_pwdp, ":\n") == -1)) {
|
|
+ || (valid_field (sp->sp_pwdp, ":\n") == -1)
|
|
+ || (strlen (sp->sp_namp) + strlen (sp->sp_pwdp) +
|
|
+ 1000 > PASSWD_ENTRY_MAX_LENGTH)) {
|
|
return -1;
|
|
}
|
|
|