increase release number
This commit is contained in:
parent
e72eda630f
commit
eab8b43860
2 changed files with 538 additions and 1 deletions
532
shadow-4.1.2-uid.patch
Normal file
532
shadow-4.1.2-uid.patch
Normal file
|
@ -0,0 +1,532 @@
|
||||||
|
diff -up /dev/null shadow-4.1.2/lib/get_gid.c
|
||||||
|
--- /dev/null 2009-03-16 11:03:38.574001227 +0100
|
||||||
|
+++ shadow-4.1.2/lib/get_gid.c 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -0,0 +1,54 @@
|
||||||
|
+/*
|
||||||
|
+ * Copyright (c) 2009 , Nicolas François
|
||||||
|
+ * All rights reserved.
|
||||||
|
+ *
|
||||||
|
+ * Redistribution and use in source and binary forms, with or without
|
||||||
|
+ * modification, are permitted provided that the following conditions
|
||||||
|
+ * are met:
|
||||||
|
+ * 1. Redistributions of source code must retain the above copyright
|
||||||
|
+ * notice, this list of conditions and the following disclaimer.
|
||||||
|
+ * 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
+ * notice, this list of conditions and the following disclaimer in the
|
||||||
|
+ * documentation and/or other materials provided with the distribution.
|
||||||
|
+ * 3. The name of the copyright holders or contributors may not be used to
|
||||||
|
+ * endorse or promote products derived from this software without
|
||||||
|
+ * specific prior written permission.
|
||||||
|
+ *
|
||||||
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||||
|
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||||
|
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
|
||||||
|
+ * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||||||
|
+ * HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||||
|
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||||||
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||||||
|
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||||
|
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||||
|
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+#include <config.h>
|
||||||
|
+
|
||||||
|
+#ident "$Id$"
|
||||||
|
+
|
||||||
|
+#include "prototypes.h"
|
||||||
|
+#include "defines.h"
|
||||||
|
+
|
||||||
|
+int get_gid (const char *gidstr, gid_t *gid)
|
||||||
|
+{
|
||||||
|
+ long long int val;
|
||||||
|
+ char *endptr;
|
||||||
|
+
|
||||||
|
+ errno = 0;
|
||||||
|
+ val = strtoll (gidstr, &endptr, 10);
|
||||||
|
+ if ( ('\0' == gidstr)
|
||||||
|
+ || ('\0' != *endptr)
|
||||||
|
+ || (ERANGE == errno)
|
||||||
|
+ || (val != (gid_t)val)) {
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ *gid = (gid_t)val;
|
||||||
|
+ return 1;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
diff -up /dev/null shadow-4.1.2/lib/get_uid.c
|
||||||
|
--- /dev/null 2009-03-16 11:03:38.574001227 +0100
|
||||||
|
+++ shadow-4.1.2/lib/get_uid.c 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -0,0 +1,55 @@
|
||||||
|
+/*
|
||||||
|
+ * Copyright (c) 2009 , Nicolas François
|
||||||
|
+ * All rights reserved.
|
||||||
|
+ *
|
||||||
|
+ * Redistribution and use in source and binary forms, with or without
|
||||||
|
+ * modification, are permitted provided that the following conditions
|
||||||
|
+ * are met:
|
||||||
|
+ * 1. Redistributions of source code must retain the above copyright
|
||||||
|
+ * notice, this list of conditions and the following disclaimer.
|
||||||
|
+ * 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
+ * notice, this list of conditions and the following disclaimer in the
|
||||||
|
+ * documentation and/or other materials provided with the distribution.
|
||||||
|
+ * 3. The name of the copyright holders or contributors may not be used to
|
||||||
|
+ * endorse or promote products derived from this software without
|
||||||
|
+ * specific prior written permission.
|
||||||
|
+ *
|
||||||
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||||
|
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||||
|
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
|
||||||
|
+ * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||||||
|
+ * HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||||
|
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||||||
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||||||
|
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||||
|
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||||
|
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+#include <config.h>
|
||||||
|
+
|
||||||
|
+#ident "$Id$"
|
||||||
|
+
|
||||||
|
+#include "prototypes.h"
|
||||||
|
+#include "defines.h"
|
||||||
|
+
|
||||||
|
+int get_uid (const char *uidstr, uid_t *uid)
|
||||||
|
+{
|
||||||
|
+ long long int val;
|
||||||
|
+ char *endptr;
|
||||||
|
+
|
||||||
|
+ errno = 0;
|
||||||
|
+ val = strtoll (uidstr, &endptr, 10);
|
||||||
|
+ if ( ('\0' == uidstr)
|
||||||
|
+ || ('\0' != *endptr)
|
||||||
|
+ || (ERANGE == errno)
|
||||||
|
+ || (val != (uid_t)val)) {
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ *uid = (uid_t)val;
|
||||||
|
+ return 1;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+
|
||||||
|
diff -up shadow-4.1.2/lib/Makefile.am.uid shadow-4.1.2/lib/Makefile.am
|
||||||
|
--- shadow-4.1.2/lib/Makefile.am.uid 2008-01-06 14:57:28.000000000 +0100
|
||||||
|
+++ shadow-4.1.2/lib/Makefile.am 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -17,6 +17,8 @@ libshadow_la_SOURCES = \
|
||||||
|
fputsx.c \
|
||||||
|
getdef.c \
|
||||||
|
getdef.h \
|
||||||
|
+ get_gid.c \
|
||||||
|
+ get_uid.c \
|
||||||
|
groupio.c \
|
||||||
|
groupmem.c \
|
||||||
|
groupio.h \
|
||||||
|
diff -up shadow-4.1.2/lib/prototypes.h.uid shadow-4.1.2/lib/prototypes.h
|
||||||
|
--- shadow-4.1.2/lib/prototypes.h.uid 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
+++ shadow-4.1.2/lib/prototypes.h 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -110,6 +110,12 @@ extern int find_new_gid (int sys_group,
|
||||||
|
/* getlong.c */
|
||||||
|
extern int getlong(const char *numstr, long int *result);
|
||||||
|
|
||||||
|
+/* get_gid.c */
|
||||||
|
+extern int get_gid (const char *gidstr, gid_t *gid);
|
||||||
|
+
|
||||||
|
+/* get_uid.c */
|
||||||
|
+extern int get_uid (const char *uidstr, uid_t *uid);
|
||||||
|
+
|
||||||
|
/* fputsx.c */
|
||||||
|
extern char *fgetsx (char *, int, FILE *);
|
||||||
|
extern int fputsx (const char *, FILE *);
|
||||||
|
diff -up shadow-4.1.2/src/groupadd.c.uid shadow-4.1.2/src/groupadd.c
|
||||||
|
--- shadow-4.1.2/src/groupadd.c.uid 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
+++ shadow-4.1.2/src/groupadd.c 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -98,7 +98,6 @@ static void check_new_name (void);
|
||||||
|
static void close_files (void);
|
||||||
|
static void open_files (void);
|
||||||
|
static void fail_exit (int code);
|
||||||
|
-static gid_t get_gid (const char *gidstr);
|
||||||
|
static void process_flags (int argc, char **argv);
|
||||||
|
static void check_flags (void);
|
||||||
|
static void check_perms (void);
|
||||||
|
@@ -326,22 +325,6 @@ static void fail_exit (int code)
|
||||||
|
exit (code);
|
||||||
|
}
|
||||||
|
|
||||||
|
-/*
|
||||||
|
- * get_id - validate and get group ID
|
||||||
|
- */
|
||||||
|
-static gid_t get_gid (const char *gidstr)
|
||||||
|
-{
|
||||||
|
- long val;
|
||||||
|
- char *errptr;
|
||||||
|
-
|
||||||
|
- val = strtol (gidstr, &errptr, 10);
|
||||||
|
- if (('\0' != *errptr) || (errno == ERANGE) || (val < 0)) {
|
||||||
|
- fprintf (stderr, _("%s: invalid numeric argument '%s'\n"),
|
||||||
|
- Prog, gidstr);
|
||||||
|
- exit (E_BAD_ARG);
|
||||||
|
- }
|
||||||
|
- return val;
|
||||||
|
-}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* process_flags - parse the command line options
|
||||||
|
@@ -383,7 +366,13 @@ static void process_flags (int argc, cha
|
||||||
|
break;
|
||||||
|
case 'g':
|
||||||
|
gflg++;
|
||||||
|
- group_id = get_gid (optarg);
|
||||||
|
+ if ( (get_gid (optarg, &group_id) == 0)
|
||||||
|
+ || (group_id == (gid_t)-1)) {
|
||||||
|
+ fprintf (stderr,
|
||||||
|
+ _("%s: invalid group ID '%s'\n"),
|
||||||
|
+ Prog, optarg);
|
||||||
|
+ exit (E_BAD_ARG);
|
||||||
|
+ }
|
||||||
|
break;
|
||||||
|
case 'h':
|
||||||
|
usage ();
|
||||||
|
diff -up shadow-4.1.2/src/groupmod.c.uid shadow-4.1.2/src/groupmod.c
|
||||||
|
--- shadow-4.1.2/src/groupmod.c.uid 2008-04-27 02:40:13.000000000 +0200
|
||||||
|
+++ shadow-4.1.2/src/groupmod.c 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -100,7 +100,6 @@ static void check_new_name (void);
|
||||||
|
static void process_flags (int, char **);
|
||||||
|
static void close_files (void);
|
||||||
|
static void open_files (void);
|
||||||
|
-static gid_t get_gid (const char *gidstr);
|
||||||
|
static void update_primary_groups (gid_t ogid, gid_t ngid);
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -361,23 +360,6 @@ static void check_new_name (void)
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
- * get_id - validate and get group ID
|
||||||
|
- */
|
||||||
|
-static gid_t get_gid (const char *gidstr)
|
||||||
|
-{
|
||||||
|
- long val;
|
||||||
|
- char *errptr;
|
||||||
|
-
|
||||||
|
- val = strtol (gidstr, &errptr, 10);
|
||||||
|
- if (*errptr || errno == ERANGE || val < 0) {
|
||||||
|
- fprintf (stderr, _("%s: invalid numeric argument '%s'\n"), Prog,
|
||||||
|
- gidstr);
|
||||||
|
- fail_exit (E_BAD_ARG);
|
||||||
|
- }
|
||||||
|
- return val;
|
||||||
|
-}
|
||||||
|
-
|
||||||
|
-/*
|
||||||
|
* process_flags - perform command line argument setting
|
||||||
|
*
|
||||||
|
* process_flags() interprets the command line arguments and sets the
|
||||||
|
@@ -404,7 +386,13 @@ static void process_flags (int argc, cha
|
||||||
|
switch (c) {
|
||||||
|
case 'g':
|
||||||
|
gflg++;
|
||||||
|
- group_newid = get_gid (optarg);
|
||||||
|
+ if ( (get_gid (optarg, &group_newid) == 0)
|
||||||
|
+ || (group_newid == (gid_t)-1)) {
|
||||||
|
+ fprintf (stderr,
|
||||||
|
+ _("%s: invalid group ID '%s'\n"),
|
||||||
|
+ Prog, optarg);
|
||||||
|
+ exit (E_BAD_ARG);
|
||||||
|
+ }
|
||||||
|
#ifdef WITH_AUDIT
|
||||||
|
audit_logger (AUDIT_USER_CHAUTHTOK,
|
||||||
|
Prog, "modifying group",
|
||||||
|
diff -up shadow-4.1.2/src/newusers.c.uid shadow-4.1.2/src/newusers.c
|
||||||
|
--- shadow-4.1.2/src/newusers.c.uid 2008-04-27 02:40:13.000000000 +0200
|
||||||
|
+++ shadow-4.1.2/src/newusers.c 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -90,7 +90,7 @@ static pam_handle_t *pamh = NULL;
|
||||||
|
static void usage (void);
|
||||||
|
static void fail_exit (int);
|
||||||
|
static int add_group (const char *, const char *, gid_t *, gid_t);
|
||||||
|
-static int get_uid (const char *, uid_t *);
|
||||||
|
+static int get_user_id (const char *, uid_t *);
|
||||||
|
static int add_user (const char *, uid_t, gid_t);
|
||||||
|
static void update_passwd (struct passwd *, const char *);
|
||||||
|
static int add_passwd (struct passwd *, const char *);
|
||||||
|
@@ -178,22 +178,26 @@ static int add_group (const char *name,
|
||||||
|
* The GID is a number, which means either this is a brand
|
||||||
|
* new group, or an existing group.
|
||||||
|
*/
|
||||||
|
- char *endptr;
|
||||||
|
- long int i = strtoul (gid, &endptr, 10);
|
||||||
|
- if ((*endptr != '\0') && (errno != ERANGE)) {
|
||||||
|
+ if (get_gid (gid, &grent.gr_gid) == 0) {
|
||||||
|
fprintf (stderr,
|
||||||
|
- _("%s: group ID `%s' is not valid\n"),
|
||||||
|
+ _("%s: invalid group ID '%s'\n"),
|
||||||
|
Prog, gid);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
- if ( (getgrgid (i) != NULL)
|
||||||
|
- || (gr_locate_gid (i) != NULL)) {
|
||||||
|
+ if ( (getgrgid ((gid_t) grent.gr_gid) != NULL)
|
||||||
|
+ || (gr_locate_gid ((gid_t) grent.gr_gid) != NULL)) {
|
||||||
|
/* The user will use this ID for her
|
||||||
|
* primary group */
|
||||||
|
- *ngid = i;
|
||||||
|
+ *ngid = (gid_t) grent.gr_gid;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
- grent.gr_gid = i;
|
||||||
|
+ /* Do not create groups with GID == (gid_t)-1 */
|
||||||
|
+ if (grent.gr_gid == (gid_t)-1) {
|
||||||
|
+ fprintf (stderr,
|
||||||
|
+ _("%s: invalid group ID '%s'\n"),
|
||||||
|
+ Prog, gid);
|
||||||
|
+ return -1;
|
||||||
|
+ }
|
||||||
|
} else {
|
||||||
|
/* The gid parameter can be "" or a name which is not
|
||||||
|
* already the name of an existing group.
|
||||||
|
@@ -267,7 +271,7 @@ static int add_group (const char *name,
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
-static int get_uid (const char *uid, uid_t *nuid) {
|
||||||
|
+static int get_user_id (const char *uid, uid_t *nuid) {
|
||||||
|
const struct passwd *pwd = NULL;
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -275,15 +279,11 @@ static int get_uid (const char *uid, uid
|
||||||
|
* caller provided, or the next available UID.
|
||||||
|
*/
|
||||||
|
if (isdigit (uid[0])) {
|
||||||
|
- char *endptr;
|
||||||
|
- long int i = strtoul (uid, &endptr, 10);
|
||||||
|
- if ((*endptr != '\0') && (errno != ERANGE)) {
|
||||||
|
- fprintf (stderr,
|
||||||
|
- _("%s: user ID `%s' is not valid\n"),
|
||||||
|
+ if ((get_uid (uid, nuid) == 0) || (*nuid == (uid_t)-1)) {
|
||||||
|
+ fprintf (stderr, _("%s: invalid user ID '%s'\n"),
|
||||||
|
Prog, uid);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
- *nuid = i;
|
||||||
|
} else {
|
||||||
|
if ('\0' != uid[0]) {
|
||||||
|
/* local, no need for xgetpwnam */
|
||||||
|
@@ -740,7 +740,7 @@ int main (int argc, char **argv)
|
||||||
|
}
|
||||||
|
|
||||||
|
if ( (NULL == pw)
|
||||||
|
- && (get_uid (fields[2], &uid) != 0)) {
|
||||||
|
+ && (get_user_id (fields[2], &uid) != 0)) {
|
||||||
|
fprintf (stderr,
|
||||||
|
_("%s: line %d: can't create user\n"),
|
||||||
|
Prog, line);
|
||||||
|
diff -up shadow-4.1.2/src/useradd.c.uid shadow-4.1.2/src/useradd.c
|
||||||
|
--- shadow-4.1.2/src/useradd.c.uid 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
+++ shadow-4.1.2/src/useradd.c 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
@@ -170,7 +170,6 @@ static int home_added;
|
||||||
|
static void fail_exit (int);
|
||||||
|
static struct group *getgr_nam_gid (const char *);
|
||||||
|
static long get_number (const char *);
|
||||||
|
-static uid_t get_uid (const char *);
|
||||||
|
static void get_defaults (void);
|
||||||
|
static void show_defaults (void);
|
||||||
|
static int set_defaults (void);
|
||||||
|
@@ -225,39 +224,30 @@ static void fail_exit (int code)
|
||||||
|
|
||||||
|
static struct group *getgr_nam_gid (const char *grname)
|
||||||
|
{
|
||||||
|
- long gid;
|
||||||
|
- char *errptr;
|
||||||
|
-
|
||||||
|
- gid = strtol (grname, &errptr, 10);
|
||||||
|
- if (*grname != '\0' && *errptr == '\0' && errno != ERANGE && gid >= 0)
|
||||||
|
+ long long int gid;
|
||||||
|
+ char *endptr;
|
||||||
|
+
|
||||||
|
+ errno = 0;
|
||||||
|
+ gid = strtoll (grname, &endptr, 10);
|
||||||
|
+ if ( ('\0' != *grname)
|
||||||
|
+ && ('\0' == *endptr)
|
||||||
|
+ && (ERANGE != errno)
|
||||||
|
+ && (gid == (gid_t)gid)) {
|
||||||
|
return xgetgrgid (gid);
|
||||||
|
+ }
|
||||||
|
return xgetgrnam (grname);
|
||||||
|
}
|
||||||
|
|
||||||
|
static long get_number (const char *numstr)
|
||||||
|
{
|
||||||
|
long val;
|
||||||
|
- char *errptr;
|
||||||
|
+ char *endptr;
|
||||||
|
|
||||||
|
- val = strtol (numstr, &errptr, 10);
|
||||||
|
- if (*errptr || errno == ERANGE) {
|
||||||
|
- fprintf (stderr, _("%s: invalid numeric argument '%s'\n"), Prog,
|
||||||
|
- numstr);
|
||||||
|
- exit (E_BAD_ARG);
|
||||||
|
- }
|
||||||
|
- return val;
|
||||||
|
-}
|
||||||
|
-
|
||||||
|
-static uid_t get_uid (const char *uidstr)
|
||||||
|
-{
|
||||||
|
- long val;
|
||||||
|
- char *errptr;
|
||||||
|
-
|
||||||
|
- val = strtol (uidstr, &errptr, 10);
|
||||||
|
- if (*errptr || errno == ERANGE || val < 0) {
|
||||||
|
- fprintf (stderr,
|
||||||
|
- _("%s: invalid numeric argument '%s'\n"), Prog,
|
||||||
|
- uidstr);
|
||||||
|
+ errno = 0;
|
||||||
|
+ val = strtol (numstr, &endptr, 10);
|
||||||
|
+ if (('\0' == *numstr) || ('\0' != *endptr) || (ERANGE == errno)) {
|
||||||
|
+ fprintf (stderr, _("%s: invalid numeric argument '%s'\n"),
|
||||||
|
+ Prog, numstr);
|
||||||
|
exit (E_BAD_ARG);
|
||||||
|
}
|
||||||
|
return val;
|
||||||
|
@@ -302,26 +292,13 @@ static void get_defaults (void)
|
||||||
|
* Primary GROUP identifier
|
||||||
|
*/
|
||||||
|
if (MATCH (buf, DGROUP)) {
|
||||||
|
- unsigned int val = (unsigned int) strtoul (cp, &ep, 10);
|
||||||
|
- const struct group *grp;
|
||||||
|
-
|
||||||
|
- if (*cp != '\0' && *ep == '\0') { /* valid number */
|
||||||
|
- def_group = val;
|
||||||
|
- /* local, no need for xgetgrgid */
|
||||||
|
- if ((grp = getgrgid (def_group))) {
|
||||||
|
- def_gname = xstrdup (grp->gr_name);
|
||||||
|
- } else {
|
||||||
|
- fprintf (stderr,
|
||||||
|
- _("%s: unknown GID %s\n"),
|
||||||
|
- Prog, cp);
|
||||||
|
- }
|
||||||
|
- /* local, no need for xgetgrnam */
|
||||||
|
- } else if ((grp = getgrnam (cp))) {
|
||||||
|
- def_group = grp->gr_gid;
|
||||||
|
- def_gname = xstrdup (cp);
|
||||||
|
+ const struct group *grp = getgr_nam_gid (cp);
|
||||||
|
+ if (NULL == grp) {
|
||||||
|
+ fprintf (stderr, _("%s: unknown GID %s\n"),
|
||||||
|
+ Prog, cp);
|
||||||
|
} else {
|
||||||
|
- fprintf (stderr,
|
||||||
|
- _("%s: unknown group %s\n"), Prog, cp);
|
||||||
|
+ def_group = grp->gr_gid;
|
||||||
|
+ def_gname = xstrdup (grp->gr_name);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -343,12 +320,17 @@ static void get_defaults (void)
|
||||||
|
* Default Password Inactive value
|
||||||
|
*/
|
||||||
|
else if (MATCH (buf, INACT)) {
|
||||||
|
+ errno = 0;
|
||||||
|
long val = strtol (cp, &ep, 10);
|
||||||
|
|
||||||
|
- if (*cp || errno == ERANGE)
|
||||||
|
+ if ( ('\0' != *cp)
|
||||||
|
+ && ('\0' == *ep)
|
||||||
|
+ && (ERANGE != errno)
|
||||||
|
+ && (val >= 0)) {
|
||||||
|
def_inactive = val;
|
||||||
|
- else
|
||||||
|
+ } else {
|
||||||
|
def_inactive = -1;
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -1080,7 +1062,13 @@ static void process_flags (int argc, cha
|
||||||
|
sflg++;
|
||||||
|
break;
|
||||||
|
case 'u':
|
||||||
|
- user_id = get_uid (optarg);
|
||||||
|
+ if ( (get_uid (optarg, &user_id) == 0)
|
||||||
|
+ || (user_id == (gid_t)-1)) {
|
||||||
|
+ fprintf (stderr,
|
||||||
|
+ _("%s: invalid user ID '%s'\n"),
|
||||||
|
+ Prog, optarg);
|
||||||
|
+ exit (E_BAD_ARG);
|
||||||
|
+ }
|
||||||
|
uflg++;
|
||||||
|
break;
|
||||||
|
case 'U':
|
||||||
|
diff -up shadow-4.1.2/src/usermod.c.uid shadow-4.1.2/src/usermod.c
|
||||||
|
--- shadow-4.1.2/src/usermod.c.uid 2009-03-23 18:45:59.000000000 +0100
|
||||||
|
+++ shadow-4.1.2/src/usermod.c 2009-03-23 18:48:36.000000000 +0100
|
||||||
|
@@ -155,7 +155,6 @@ static void update_gshadow (void);
|
||||||
|
static void grp_update (void);
|
||||||
|
|
||||||
|
static long get_number (const char *);
|
||||||
|
-static uid_t get_id (const char *);
|
||||||
|
static void process_flags (int, char **);
|
||||||
|
static void close_files (void);
|
||||||
|
static void open_files (void);
|
||||||
|
@@ -193,12 +192,17 @@ static void date_to_str (char *buf, size
|
||||||
|
*/
|
||||||
|
static struct group *getgr_nam_gid (const char *grname)
|
||||||
|
{
|
||||||
|
- long val;
|
||||||
|
- char *errptr;
|
||||||
|
-
|
||||||
|
- val = strtol (grname, &errptr, 10);
|
||||||
|
- if (*grname != '\0' && *errptr == '\0' && errno != ERANGE && val >= 0)
|
||||||
|
+ long long int val;
|
||||||
|
+ char *endptr;
|
||||||
|
+
|
||||||
|
+ errno = 0;
|
||||||
|
+ val = strtoll (grname, &endptr, 10);
|
||||||
|
+ if ( ('\0' != *grname)
|
||||||
|
+ && ('\0' == *endptr)
|
||||||
|
+ && (ERANGE != errno)
|
||||||
|
+ && (val == (gid_t)val)) {
|
||||||
|
return xgetgrgid (val);
|
||||||
|
+ }
|
||||||
|
return xgetgrnam (grname);
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -752,20 +756,6 @@ static long get_number (const char *nums
|
||||||
|
return val;
|
||||||
|
}
|
||||||
|
|
||||||
|
-static uid_t get_id (const char *uidstr)
|
||||||
|
-{
|
||||||
|
- long val;
|
||||||
|
- char *errptr;
|
||||||
|
-
|
||||||
|
- val = strtol (uidstr, &errptr, 10);
|
||||||
|
- if (*errptr || errno == ERANGE || val < 0) {
|
||||||
|
- fprintf (stderr, _("%s: invalid numeric argument '%s'\n"), Prog,
|
||||||
|
- uidstr);
|
||||||
|
- exit (E_BAD_ARG);
|
||||||
|
- }
|
||||||
|
- return val;
|
||||||
|
-}
|
||||||
|
-
|
||||||
|
/*
|
||||||
|
* process_flags - perform command line argument setting
|
||||||
|
*
|
||||||
|
@@ -963,7 +953,13 @@ static void process_flags (int argc, cha
|
||||||
|
sflg++;
|
||||||
|
break;
|
||||||
|
case 'u':
|
||||||
|
- user_newid = get_id (optarg);
|
||||||
|
+ if ( (get_uid (optarg, &user_newid) ==0)
|
||||||
|
+ || (user_newid == (uid_t)-1)) {
|
||||||
|
+ fprintf (stderr,
|
||||||
|
+ _("%s: invalid user ID '%s'\n"),
|
||||||
|
+ Prog, optarg);
|
||||||
|
+ exit (E_BAD_ARG);
|
||||||
|
+ }
|
||||||
|
uflg++;
|
||||||
|
break;
|
||||||
|
case 'U':
|
|
@ -5,7 +5,7 @@
|
||||||
Summary: Utilities for managing accounts and shadow password files
|
Summary: Utilities for managing accounts and shadow password files
|
||||||
Name: shadow-utils
|
Name: shadow-utils
|
||||||
Version: 4.1.2
|
Version: 4.1.2
|
||||||
Release: 12%{?dist}
|
Release: 13%{?dist}
|
||||||
Epoch: 2
|
Epoch: 2
|
||||||
URL: http://pkg-shadow.alioth.debian.org/
|
URL: http://pkg-shadow.alioth.debian.org/
|
||||||
Source0: ftp://pkg-shadow.alioth.debian.org/pub/pkg-shadow/shadow-%{version}.tar.bz2
|
Source0: ftp://pkg-shadow.alioth.debian.org/pub/pkg-shadow/shadow-%{version}.tar.bz2
|
||||||
|
@ -21,6 +21,7 @@ Patch5: shadow-4.1.2-audit.patch
|
||||||
Patch6: shadow-4.1.1-selinuxUserMappings.patch
|
Patch6: shadow-4.1.1-selinuxUserMappings.patch
|
||||||
Patch7: shadow-4.1.2-checkName.patch
|
Patch7: shadow-4.1.2-checkName.patch
|
||||||
Patch8: shadow-4.1.2-gmNoGroup.patch
|
Patch8: shadow-4.1.2-gmNoGroup.patch
|
||||||
|
Patch9: shadow-4.1.2-uid.patch
|
||||||
|
|
||||||
License: BSD and GPLv2+
|
License: BSD and GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
|
@ -55,6 +56,7 @@ are used for managing group accounts.
|
||||||
%patch6 -p1 -b .selinuxUserMappings
|
%patch6 -p1 -b .selinuxUserMappings
|
||||||
%patch7 -p1 -b .checkName
|
%patch7 -p1 -b .checkName
|
||||||
%patch8 -p1 -b .gmNoGroup
|
%patch8 -p1 -b .gmNoGroup
|
||||||
|
%patch9 -p1 -b .uid
|
||||||
|
|
||||||
iconv -f ISO88591 -t utf-8 doc/HOWTO > doc/HOWTO.utf8
|
iconv -f ISO88591 -t utf-8 doc/HOWTO > doc/HOWTO.utf8
|
||||||
cp -f doc/HOWTO.utf8 doc/HOWTO
|
cp -f doc/HOWTO.utf8 doc/HOWTO
|
||||||
|
@ -197,6 +199,9 @@ rm -rf $RPM_BUILD_ROOT
|
||||||
%{_mandir}/man8/vigr.8*
|
%{_mandir}/man8/vigr.8*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Mar 24 2009 Peter Vrabec <pvrabec@redhat.com> 2:4.1.2-13
|
||||||
|
- do not allow UID/GID = 4294967295 (#484040,#133664)
|
||||||
|
|
||||||
* Wed Feb 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2:4.1.2-12
|
* Wed Feb 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2:4.1.2-12
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue