nss-pam-ldapd commit: r1772 - in nss-pam-ldapd-0.7.15+squeeze: . nslcd
[
Date Prev][
Date Next]
[
Thread Prev][
Thread Next]
nss-pam-ldapd commit: r1772 - in nss-pam-ldapd-0.7.15+squeeze: . nslcd
- From: Commits of the nss-pam-ldapd project <nss-pam-ldapd-commits [at] lists.arthurdejong.org>
- To: nss-pam-ldapd-commits [at] lists.arthurdejong.org
- Reply-to: nss-pam-ldapd-users [at] lists.arthurdejong.org
- Subject: nss-pam-ldapd commit: r1772 - in nss-pam-ldapd-0.7.15+squeeze: . nslcd
- Date: Thu, 20 Sep 2012 20:34:04 +0200 (CEST)
Author: arthur
Date: Thu Sep 20 20:34:03 2012
New Revision: 1772
URL: http://arthurdejong.org/viewvc/nss-pam-ldapd?revision=1772&view=revision
Log:
implements proper range checking numeric values returned from LDAP (thanks
Jakub Hrozek) (r1523, r1524 and r1528 from 0.8, r1600 from 0.7)
Modified:
nss-pam-ldapd-0.7.15+squeeze/ (props changed)
nss-pam-ldapd-0.7.15+squeeze/AUTHORS
nss-pam-ldapd-0.7.15+squeeze/configure.ac
nss-pam-ldapd-0.7.15+squeeze/nslcd/cfg.c
nss-pam-ldapd-0.7.15+squeeze/nslcd/common.c
nss-pam-ldapd-0.7.15+squeeze/nslcd/common.h
nss-pam-ldapd-0.7.15+squeeze/nslcd/group.c
nss-pam-ldapd-0.7.15+squeeze/nslcd/passwd.c
nss-pam-ldapd-0.7.15+squeeze/nslcd/protocol.c
nss-pam-ldapd-0.7.15+squeeze/nslcd/rpc.c
nss-pam-ldapd-0.7.15+squeeze/nslcd/service.c
nss-pam-ldapd-0.7.15+squeeze/nslcd/shadow.c
Modified: nss-pam-ldapd-0.7.15+squeeze/AUTHORS
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/AUTHORS Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/AUTHORS Thu Sep 20 20:34:03 2012
(r1772)
@@ -79,3 +79,4 @@
Jan Schampera <jan.schampera@web.de>
Nalin Dahyabhai <nalin@redhat.com>
Daniel Dehennin <daniel.dehennin@baby-gnu.org>
+Jakub Hrozek <jhrozek@redhat.com>
Modified: nss-pam-ldapd-0.7.15+squeeze/configure.ac
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/configure.ac Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/configure.ac Thu Sep 20 20:34:03 2012
(r1772)
@@ -222,7 +222,7 @@
AC_CHECK_FUNCS([sigaction snprintf])
AC_CHECK_FUNCS(gethostbyname)
AC_SEARCH_LIBS(socket,socket)
-AC_CHECK_FUNCS([strcasecmp strncasecmp strchr strcspn strspn strtol])
+AC_CHECK_FUNCS([strcasecmp strncasecmp strchr strcspn strspn strtol strtoul
strtoull])
AC_CHECK_FUNCS([malloc realloc])
AC_FUNC_FORK
@@ -235,6 +235,11 @@
AC_TYPE_UINT8_T
AC_TYPE_UINT16_T
AC_TYPE_UINT32_T
+AC_CHECK_SIZEOF(unsigned int)
+AC_CHECK_SIZEOF(unsigned long int)
+AC_CHECK_SIZEOF(unsigned long long int)
+AC_CHECK_SIZEOF(uid_t)
+AC_CHECK_SIZEOF(gid_t)
# check for support for the __thread keyword
AC_CACHE_CHECK([whether $CC supports '__thread'], [mn_cv_c___thread_supported],
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/cfg.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/cfg.c Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/cfg.c Thu Sep 20 20:34:03 2012
(r1772)
@@ -442,8 +442,9 @@
char *tmp;
check_argumentcount(filename,lnr,keyword,get_token(line,token,sizeof(token))!=NULL);
/* check if it is a valid numerical uid */
- *var=(uid_t)strtol(token,&tmp,0);
- if ((*token!='\0')&&(*tmp=='\0'))
+ errno=0;
+ *var=strtouid(token,&tmp,0);
+ if ((*token!='\0')&&(*tmp=='\0')&&(errno==0))
return;
/* find by name */
pwent=getpwnam(token);
@@ -467,8 +468,9 @@
char *tmp;
check_argumentcount(filename,lnr,keyword,get_token(line,token,sizeof(token))!=NULL);
/* check if it is a valid numerical gid */
- *var=(gid_t)strtol(token,&tmp,0);
- if ((*token!='\0')&&(*tmp=='\0'))
+ errno=0;
+ *var=strtogid(token,&tmp,0);
+ if ((*token!='\0')&&(*tmp=='\0')&&(errno==0))
return;
/* find by name */
grent=getgrnam(token);
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/common.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/common.c Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/common.c Thu Sep 20 20:34:03 2012
(r1772)
@@ -3,7 +3,7 @@
This file is part of the nss-pam-ldapd library.
Copyright (C) 2006 West Consulting
- Copyright (C) 2006, 2007, 2008, 2009 Arthur de Jong
+ Copyright (C) 2006, 2007, 2008, 2009, 2011 Arthur de Jong
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
@@ -176,3 +176,20 @@
/* we're done */
return 0;
}
+
+#ifdef WANT_STRTOUI
+/* provide a strtoui() implementation, similar to strtoul() but returning
+ an range-checked unsigned int instead */
+unsigned int strtoui(const char *nptr,char **endptr,int base)
+{
+ unsigned long val;
+ val=strtoul(nptr,endptr,base);
+ if (val>UINT_MAX)
+ {
+ errno=ERANGE;
+ return UINT_MAX;
+ }
+ /* If errno was set by strtoull, we'll pass it back as-is */
+ return (unsigned int)val;
+}
+#endif /* WANT_STRTOUI */
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/common.h
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/common.h Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/common.h Thu Sep 20 20:34:03 2012
(r1772)
@@ -3,7 +3,7 @@
This file is part of the nss-pam-ldapd library.
Copyright (C) 2006 West Consulting
- Copyright (C) 2006, 2007, 2008, 2009, 2010 Arthur de Jong
+ Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Arthur de Jong
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
@@ -94,6 +94,37 @@
/* transforms the uid into a DN by doing an LDAP lookup */
MUST_USE char *uid2dn(MYLDAP_SESSION *session,const char *uid,char *buf,size_t
buflen);
+/* provide strtouid() function alias */
+#if SIZEOF_UID_T == SIZEOF_UNSIGNED_LONG_INT
+#define strtouid (uid_t)strtoul
+#elif SIZEOF_UID_T == SIZEOF_UNSIGNED_LONG_LONG_INT
+#define strtouid (uid_t)strtoull
+#elif SIZEOF_UID_T == SIZEOF_UNSIGNED_INT
+#define WANT_STRTOUI 1
+#define strtouid (uid_t)strtoui
+#else
+#error unable to find implementation for strtouid()
+#endif
+
+/* provide strtouid() function alias */
+#if SIZEOF_GID_T == SIZEOF_UNSIGNED_LONG_INT
+#define strtogid (gid_t)strtoul
+#elif SIZEOF_GID_T == SIZEOF_UNSIGNED_LONG_LONG_INT
+#define strtogid (gid_t)strtoull
+#elif SIZEOF_GID_T == SIZEOF_UNSIGNED_INT
+#ifndef WANT_STRTOUI
+#define WANT_STRTOUI 1
+#endif
+#define strtogid (uid_t)strtoui
+#else
+#error unable to find implementation for strtogid()
+#endif
+
+#ifdef WANT_STRTOUI
+/* provide a strtoui() if it is needed */
+unsigned int strtoui(const char *nptr,char **endptr,int base);
+#endif /* WANT_STRTOUI */
+
/* these are the functions for initialising the database specific
modules */
void alias_init(void);
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/group.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/group.c Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/group.c Thu Sep 20 20:34:03 2012
(r1772)
@@ -251,13 +251,20 @@
}
for
(numgids=0;(gidvalues[numgids]!=NULL)&&(numgids<MAXGIDS_PER_ENTRY);numgids++)
{
- gids[numgids]=(gid_t)strtol(gidvalues[numgids],&tmp,0);
+ errno=0;
+ gids[numgids]=strtogid(gidvalues[numgids],&tmp,0);
if ((*(gidvalues[numgids])=='\0')||(*tmp!='\0'))
{
log_log(LOG_WARNING,"group entry %s contains non-numeric %s value",
myldap_get_dn(entry),attmap_group_gidNumber);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"group entry %s contains too large %s value",
+ myldap_get_dn(entry),attmap_group_gidNumber);
+ return 0;
+ }
}
}
/* get group passwd (userPassword) (use only first entry) */
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/passwd.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/passwd.c Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/passwd.c Thu Sep 20 20:34:03 2012
(r1772)
@@ -338,13 +338,20 @@
}
for
(numuids=0;(numuids<MAXUIDS_PER_ENTRY)&&(tmpvalues[numuids]!=NULL);numuids++)
{
- uids[numuids]=(uid_t)strtol(tmpvalues[numuids],&tmp,0);
+ errno=0;
+ uids[numuids]=strtouid(tmpvalues[numuids],&tmp,0);
if ((*(tmpvalues[numuids])=='\0')||(*tmp!='\0'))
{
log_log(LOG_WARNING,"passwd entry %s contains non-numeric %s value",
myldap_get_dn(entry),attmap_passwd_uidNumber);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"passwd entry %s contains too large %s value",
+ myldap_get_dn(entry),attmap_passwd_uidNumber);
+ return 0;
+ }
}
}
/* get the gid for this entry */
@@ -355,13 +362,20 @@
myldap_get_dn(entry),attmap_passwd_gidNumber);
return 0;
}
- gid=(gid_t)strtol(gidbuf,&tmp,0);
+ errno=0;
+ gid=strtogid(gidbuf,&tmp,0);
if ((gidbuf[0]=='\0')||(*tmp!='\0'))
{
log_log(LOG_WARNING,"passwd entry %s contains non-numeric %s value",
myldap_get_dn(entry),attmap_passwd_gidNumber);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"passwd entry %s contains too large %s value",
+ myldap_get_dn(entry),attmap_passwd_gidNumber);
+ return 0;
+ }
/* get the gecos for this entry */
attmap_get_value(entry,attmap_passwd_gecos,gecos,sizeof(gecos));
/* get the home directory for this entry */
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/protocol.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/protocol.c Sun Sep 16 17:57:02
2012 (r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/protocol.c Thu Sep 20 20:34:03
2012 (r1772)
@@ -5,7 +5,7 @@
Copyright (C) 1997-2005 Luke Howard
Copyright (C) 2006 West Consulting
- Copyright (C) 2006, 2007, 2009, 2010 Arthur de Jong
+ Copyright (C) 2006, 2007, 2009, 2010, 2011 Arthur de Jong
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
@@ -143,6 +143,7 @@
log_log(LOG_WARNING,"protocol entry %s contains multiple %s values",
myldap_get_dn(entry),attmap_protocol_ipProtocolNumber);
}
+ errno=0;
proto=(int)strtol(protos[0],&tmp,0);
if ((*(protos[0])=='\0')||(*tmp!='\0'))
{
@@ -150,6 +151,12 @@
myldap_get_dn(entry),attmap_protocol_ipProtocolNumber);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"protocol entry %s contains too large %s value",
+ myldap_get_dn(entry),attmap_protocol_ipProtocolNumber);
+ return 0;
+ }
/* write entry */
WRITE_INT32(fp,NSLCD_RESULT_BEGIN);
WRITE_STRING(fp,name);
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/rpc.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/rpc.c Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/rpc.c Thu Sep 20 20:34:03 2012
(r1772)
@@ -5,7 +5,7 @@
Copyright (C) 1997-2005 Luke Howard
Copyright (C) 2006 West Consulting
- Copyright (C) 2006, 2007, 2009, 2010 Arthur de Jong
+ Copyright (C) 2006, 2007, 2009, 2010, 2011 Arthur de Jong
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
@@ -144,6 +144,7 @@
log_log(LOG_WARNING,"rpc entry %s contains multiple %s values",
myldap_get_dn(entry),attmap_rpc_oncRpcNumber);
}
+ errno=0;
number=(int)strtol(numbers[0],&tmp,0);
if ((*(numbers[0])=='\0')||(*tmp!='\0'))
{
@@ -151,6 +152,12 @@
myldap_get_dn(entry),attmap_rpc_oncRpcNumber);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"rpc entry %s contains too large %s value",
+ myldap_get_dn(entry),attmap_rpc_oncRpcNumber);
+ return 0;
+ }
/* write the entry */
WRITE_INT32(fp,NSLCD_RESULT_BEGIN);
WRITE_STRING(fp,name);
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/service.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/service.c Sun Sep 16 17:57:02
2012 (r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/service.c Thu Sep 20 20:34:03
2012 (r1772)
@@ -5,7 +5,7 @@
Copyright (C) 1997-2005 Luke Howard
Copyright (C) 2006 West Consulting
- Copyright (C) 2006, 2007, 2009, 2010 Arthur de Jong
+ Copyright (C) 2006, 2007, 2009, 2010, 2011 Arthur de Jong
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
@@ -172,6 +172,7 @@
log_log(LOG_WARNING,"service entry %s contains multiple %s values",
myldap_get_dn(entry),attmap_service_ipServicePort);
}
+ errno=0;
port=(int)strtol(ports[0],&tmp,0);
if ((*(ports[0])=='\0')||(*tmp!='\0'))
{
@@ -179,6 +180,12 @@
myldap_get_dn(entry),attmap_service_ipServicePort);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"service entry %s contains too large %s value",
+ myldap_get_dn(entry),attmap_service_ipServicePort);
+ return 0;
+ }
/* get protocols */
protocols=myldap_get_values(entry,attmap_service_ipServiceProtocol);
if ((protocols==NULL)||(protocols[0]==NULL))
Modified: nss-pam-ldapd-0.7.15+squeeze/nslcd/shadow.c
==============================================================================
--- nss-pam-ldapd-0.7.15+squeeze/nslcd/shadow.c Sun Sep 16 17:57:02 2012
(r1771)
+++ nss-pam-ldapd-0.7.15+squeeze/nslcd/shadow.c Thu Sep 20 20:34:03 2012
(r1772)
@@ -128,22 +128,34 @@
return 0; /* error */
strncpy(buffer,date,l);
buffer[l]='\0';
+ errno=0;
value=strtol(date,&tmp,0);
if ((*date=='\0')||(*tmp!='\0'))
{
log_log(LOG_WARNING,"shadow entry contains non-numeric %s value",attr);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"shadow entry contains too large %s value",attr);
+ return -1;
+ }
return value/864-134774;
/* note that AD does not have expiry dates but a lastchangeddate
and some value that needs to be added */
}
+ errno=0;
value=strtol(date,&tmp,0);
if ((*date=='\0')||(*tmp!='\0'))
{
log_log(LOG_WARNING,"shadow entry contains non-numeric %s value",attr);
return 0;
}
+ else if (errno!=0)
+ {
+ log_log(LOG_WARNING,"shadow entry contains too large %s value",attr);
+ return -1;
+ }
return value;
}
@@ -155,12 +167,19 @@
tmpvalue=attmap_get_value(entry,attmap_shadow_##att,buffer,sizeof(buffer)); \
if (tmpvalue==NULL) \
tmpvalue=""; \
+ errno=0; \
var=strtol(tmpvalue,&tmp,0); \
if ((*(tmpvalue)=='\0')||(*tmp!='\0')) \
{ \
log_log(LOG_WARNING,"shadow entry %s contains non-numeric %s value", \
myldap_get_dn(entry),attmap_shadow_##att); \
return 0; \
+ } \
+ else if (errno!=0) \
+ { \
+ log_log(LOG_WARNING,"shadow entry %s contains too large %s value", \
+ myldap_get_dn(entry),attmap_shadow_##att); \
+ return 0; \
}
#define GET_OPTIONAL_DATE(var,att) \
--
To unsubscribe send an email to
nss-pam-ldapd-commits-unsubscribe@lists.arthurdejong.org or see
http://lists.arthurdejong.org/nss-pam-ldapd-commits/
- nss-pam-ldapd commit: r1772 - in nss-pam-ldapd-0.7.15+squeeze: . nslcd,
Commits of the nss-pam-ldapd project