]> granicus.if.org Git - linux-pam/commitdiff
Relevant BUGIDs: debian#514437 rhbz#487216
authorTomas Mraz <tm@t8m.info>
Thu, 26 Feb 2009 18:56:12 +0000 (18:56 +0000)
committerTomas Mraz <tm@t8m.info>
Thu, 26 Feb 2009 18:56:12 +0000 (18:56 +0000)
Purpose of commit: bugfix

Commit summary:
---------------
2009-02-26  Tomas Mraz <t8m@centrum.cz>

        * xtests/Makefile.am: Add tst-pam_unix4.
        * xtests/tst-pam_unix4.c: New test for password change
        and shadow min days limit.
        * xtests/tst-pam_unix4.pamd: Likewise.
        * xtests/tst-pam_unix4.sh: Likewise.

        * modules/pam_unix/pam_unix_acct.c (pam_sm_acct_mgmt): Ignore
        PAM_AUTHTOK_ERR on shadow verification.
        * modules/pam_unix/passverify.c (check_shadow_expiry): Return
        PAM_AUTHTOK_ERR if sp_min limit for password change is defied.

ChangeLog
NEWS
modules/pam_unix/pam_unix_acct.c
modules/pam_unix/passverify.c
xtests/.cvsignore
xtests/Makefile.am
xtests/tst-pam_unix4.c [new file with mode: 0644]
xtests/tst-pam_unix4.pamd [new file with mode: 0644]
xtests/tst-pam_unix4.sh [new file with mode: 0755]

index 7b50d82b49f3751dd062c7a9e4ae6f2642159dcb..513a0d45a2e177ad6248c1cde4944ce1a5f3263d 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,16 @@
+2009-02-26  Tomas Mraz <t8m@centrum.cz>
+
+       * xtests/Makefile.am: Add tst-pam_unix4.
+       * xtests/tst-pam_unix4.c: New test for password change
+        and shadow min days limit.
+       * xtests/tst-pam_unix4.pamd: Likewise.
+       * xtests/tst-pam_unix4.sh: Likewise.
+
+       * modules/pam_unix/pam_unix_acct.c (pam_sm_acct_mgmt): Ignore
+        PAM_AUTHTOK_ERR on shadow verification.
+       * modules/pam_unix/passverify.c (check_shadow_expiry): Return
+        PAM_AUTHTOK_ERR if sp_min limit for password change is defied.
+
 2009-02-26  Timur Birsh <taem@linukz.org>
 
        * po/LINGUAS: New Kazakh translation.
diff --git a/NEWS b/NEWS
index d41c0556b7104692aca64f470f4437144ac9649c..96724b1b354025fc71d0d3de8d0d2204e67834ea 100644 (file)
--- a/NEWS
+++ b/NEWS
@@ -1,5 +1,6 @@
 Linux-PAM NEWS -- history of user-visible changes.
 
+* Fixed CVE-2009-0579 (minimum days limit on password change is ignored).
 
 Release 1.0.90
 
index 3a40d8d3899d0456a7db348501160280f7b69f1d..40ff3c0682b141fb5f3de27c7371be187f50ebb1 100644 (file)
@@ -249,6 +249,9 @@ PAM_EXTERN int pam_sm_acct_mgmt(pam_handle_t * pamh, int flags,
                _make_remark(pamh, ctrl, PAM_ERROR_MSG,
                        _("Your account has expired; please contact your system administrator"));
                break;
+       case PAM_AUTHTOK_ERR:
+               retval = PAM_SUCCESS;
+               /* fallthrough */
        case PAM_SUCCESS:
                if (daysleft >= 0) {
                        pam_syslog(pamh, LOG_DEBUG,
index 281716e09c42ee1743840fec109976165bf746ed..360bd90b93166a6198b6b29bcb3c5d31fef78712 100644 (file)
@@ -272,8 +272,16 @@ PAMH_ARG_DECL(int check_shadow_expiry,
                *daysleft = (int)((spent->sp_lstchg + spent->sp_max) - curdays);
                D(("warn before expiry"));
        }
+       if ((curdays - spent->sp_lstchg < spent->sp_min)
+           && (spent->sp_min != -1)) {
+               /* 
+                * The last password change was too recent. This error will be ignored
+                * if no password change is attempted.
+                */
+               D(("password change too recent"));
+               return PAM_AUTHTOK_ERR;
+       }
        return PAM_SUCCESS;
-
 }
 
 /* passwd/salt conversion macros */
index 4533b2490bde190e217b80053091ba20789bb0cd..52af6ddf013a60b0b13fca2aadc906814374f914 100644 (file)
@@ -17,6 +17,7 @@ tst-pam_limits1
 tst-pam_unix1
 tst-pam_unix2
 tst-pam_unix3
+tst-pam_unix4
 tst-pam_succeed_if1
 tst-pam_group1
 tst-pam_authfail
index 30ba27357f93f6a80adb6b32c7dea616710f902c..83e9dd15f335e96aa81986263306371c943c315f 100644 (file)
@@ -35,7 +35,7 @@ EXTRA_DIST = run-xtests.sh tst-pam_dispatch1.pamd tst-pam_dispatch2.pamd \
 XTESTS = tst-pam_dispatch1 tst-pam_dispatch2 tst-pam_dispatch3 \
        tst-pam_dispatch4 tst-pam_dispatch5 \
        tst-pam_cracklib1 tst-pam_cracklib2 \
-       tst-pam_unix1 tst-pam_unix2 tst-pam_unix3 \
+       tst-pam_unix1 tst-pam_unix2 tst-pam_unix3 tst-pam_unix4 \
        tst-pam_access1 tst-pam_access2 tst-pam_access3 \
        tst-pam_access4 tst-pam_limits1 tst-pam_succeed_if1 \
        tst-pam_group1 tst-pam_authfail tst-pam_authsucceed \
diff --git a/xtests/tst-pam_unix4.c b/xtests/tst-pam_unix4.c
new file mode 100644 (file)
index 0000000..1ba0a40
--- /dev/null
@@ -0,0 +1,154 @@
+/*
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, and the entire permission notice in its entirety,
+ *    including the disclaimer of warranties.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. The name of the author may not be used to endorse or promote
+ *    products derived from this software without specific prior
+ *    written permission.
+ *
+ * ALTERNATIVELY, this product may be distributed under the terms of
+ * the GNU Public License, in which case the provisions of the GPL are
+ * required INSTEAD OF the above restrictions.  (This clause is
+ * necessary due to a potential bad interaction between the GPL and
+ * the restrictions contained in a BSD-style copyright.)
+ *
+ * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+ * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+/*
+ * Check password change minimum days handling.
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <security/pam_appl.h>
+#include <sys/types.h>
+#include <pwd.h>
+#include <unistd.h>
+
+/* A conversation function which uses an internally-stored value for
+   the responses. */
+static int
+fake_conv (int num_msg, const struct pam_message **msgm UNUSED,
+          struct pam_response **response, void *appdata_ptr UNUSED)
+{
+  struct pam_response *reply;
+  int count;
+  static int respnum = 0;
+  static const char *resps[] = { "pamunix01", "TsTPAM01MAP", "TsTPAM01MAP" };
+
+  /* Sanity test. */
+  if (num_msg <= 0)
+    return PAM_CONV_ERR;
+
+  /* Allocate memory for the responses. */
+  reply = calloc (num_msg, sizeof (struct pam_response));
+  if (reply == NULL)
+    return PAM_CONV_ERR;
+
+  /* Answer with appropriate response from the above array. */
+  for (count = 0; count < num_msg; ++count)
+    {
+      if (msgm[count]->msg_style == PAM_PROMPT_ECHO_OFF)
+        {
+          reply[count].resp_retcode = 0;
+          reply[count].resp = strdup (resps[respnum % 3]);
+          ++respnum;
+        }
+    }
+
+  /* Set the pointers in the response structure and return. */
+  *response = reply;
+  return PAM_SUCCESS;
+}
+
+static struct pam_conv conv = {
+    fake_conv,
+    NULL
+};
+
+
+/* Check that errors of optional modules are ignored and that
+   required modules after a sufficient one are not executed.  */
+
+int
+main(int argc, char *argv[])
+{
+  pam_handle_t *pamh=NULL;
+  const char *user="tstpamunix";
+  int retval;
+  int debug = 0;
+  int fail;
+  struct passwd *pwd;
+
+  if (argc < 2 || (*argv[1] != 'f' &&
+      *argv[1] != 'p'))
+    {
+      fprintf (stderr, "Need fail or pass argument.\n");
+      return 2;
+    }
+
+  fail = *argv[1] == 'f';
+
+  if (argc > 2 && strcmp (argv[2], "-d") == 0)
+    debug = 1;
+
+  pwd = getpwnam (user);
+
+  if (pwd == NULL)
+    {
+       if (debug)
+         fprintf (stderr, "unix4: Missing tstpamunix user.\n");
+       return 2;
+    }
+
+  /* we must switch the real (not effective) user so the restrictions
+     are enforced */
+  setreuid (pwd->pw_uid, -1);
+
+  retval = pam_start("tst-pam_unix4", user, &conv, &pamh);
+  if (retval != PAM_SUCCESS)
+    {
+      if (debug)
+       fprintf (stderr, "unix4: pam_start returned %d\n", retval);
+      return 1;
+    }
+
+  retval = pam_chauthtok (pamh, 0);
+  if ((!fail && retval != PAM_SUCCESS) || (fail && retval == PAM_SUCCESS))
+    {
+      if (debug)
+       fprintf (stderr, "unix4-1: pam_chauthtok returned %d\n", retval);
+      return 1;
+    }
+
+  retval = pam_end (pamh,retval);
+  if (retval != PAM_SUCCESS)
+    {
+      if (debug)
+       fprintf (stderr, "unix4: pam_end returned %d\n", retval);
+      return 1;
+    }
+  return 0;
+}
diff --git a/xtests/tst-pam_unix4.pamd b/xtests/tst-pam_unix4.pamd
new file mode 100644 (file)
index 0000000..4dc414f
--- /dev/null
@@ -0,0 +1,6 @@
+#%PAM-1.0
+auth     required       pam_unix.so
+account  required       pam_unix.so
+password required       pam_unix.so debug
+session  required       pam_unix.so
+
diff --git a/xtests/tst-pam_unix4.sh b/xtests/tst-pam_unix4.sh
new file mode 100755 (executable)
index 0000000..787c2f9
--- /dev/null
@@ -0,0 +1,14 @@
+#!/bin/bash
+
+# pamunix01 = 0aXKZztA.d1KYIuFXArmd2jU
+/usr/sbin/useradd -p 0aXKZztA.d1KYIuFXArmd2jU tstpamunix
+# this run must successfully change the password
+./tst-pam_unix4 pass
+RET=$?
+/usr/sbin/usermod -p 0aXKZztA.d1KYIuFXArmd2jU tstpamunix
+/usr/bin/chage -m 10000 tstpamunix
+# this run must fail to change the password
+./tst-pam_unix4 fail || RET=$?
+
+/usr/sbin/userdel -r tstpamunix 2> /dev/null
+exit $RET