mirror of
https://github.com/Yubico/yubico-pam.git
synced 2025-02-22 18:54:37 +01:00
Verify the otp_length given by the configuration
Avoid out of bound writing at ligne -920,1 +927,1: strncpy (otp_id, password + skip_bytes, cfg->token_id_length);
This commit is contained in:
parent
2e9adfaa1c
commit
96252b6f2b
@ -781,6 +781,13 @@ pam_sm_authenticate (pam_handle_t * pamh,
|
|||||||
|
|
||||||
parse_cfg (flags, argc, argv, cfg);
|
parse_cfg (flags, argc, argv, cfg);
|
||||||
|
|
||||||
|
if (cfg->token_id_length > MAX_TOKEN_ID_LEN)
|
||||||
|
{
|
||||||
|
DBG (("configuration error: token_id_length too long. Maximum acceptable value : %d", MAX_TOKEN_ID_LEN));
|
||||||
|
retval = PAM_AUTHINFO_UNAVAIL;
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
|
||||||
retval = pam_get_user (pamh, &user, NULL);
|
retval = pam_get_user (pamh, &user, NULL);
|
||||||
if (retval != PAM_SUCCESS)
|
if (retval != PAM_SUCCESS)
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user