[openssh-commits] [openssh] 01/04: Limit the number of PAM environment variables.
git+noreply at mindrot.org
git+noreply at mindrot.org
Thu Mar 9 18:33:28 AEDT 2023
This is an automated email from the git hooks/post-receive script.
dtucker pushed a commit to branch master
in repository openssh.
commit a231414970e01a35f45a295d5f93698fa1249b28
Author: Darren Tucker <dtucker at dtucker.net>
Date: Thu Mar 9 18:19:44 2023 +1100
Limit the number of PAM environment variables.
From Coverity CID 405194, tweaks and ok djm@
---
auth-pam.c | 15 ++++++++++-----
1 file changed, 10 insertions(+), 5 deletions(-)
diff --git a/auth-pam.c b/auth-pam.c
index b324953a..f5a06b1f 100644
--- a/auth-pam.c
+++ b/auth-pam.c
@@ -351,11 +351,12 @@ import_environments(struct sshbuf *b)
/* Import environment from subprocess */
if ((r = sshbuf_get_u32(b, &num_env)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
- if (num_env > 1024)
- fatal("%s: received %u environment variables, expected <= 1024",
- __func__, num_env);
+ if (num_env > 1024) {
+ fatal_f("received %u environment variables, expected <= 1024",
+ num_env);
+ }
sshpam_env = xcalloc(num_env + 1, sizeof(*sshpam_env));
- debug3("PAM: num env strings %d", num_env);
+ debug3("PAM: num env strings %u", num_env);
for(i = 0; i < num_env; i++) {
if ((r = sshbuf_get_cstring(b, &(sshpam_env[i]), NULL)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
@@ -365,7 +366,11 @@ import_environments(struct sshbuf *b)
/* Import PAM environment from subprocess */
if ((r = sshbuf_get_u32(b, &num_env)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
- debug("PAM: num PAM env strings %d", num_env);
+ if (num_env > 1024) {
+ fatal_f("received %u PAM env variables, expected <= 1024",
+ num_env);
+ }
+ debug("PAM: num PAM env strings %u", num_env);
for (i = 0; i < num_env; i++) {
if ((r = sshbuf_get_cstring(b, &env, NULL)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list