[Bug 263893] pam_exec.so in auth stack with expose_authtok option makes su segfault
Date: Tue, 10 May 2022 13:53:22 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263893 titus m <titus@edc.ro> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |titus@edc.ro --- Comment #1 from titus m <titus@edc.ro> --- from pam_exec(8) expose_authtok Write the authentication token to the program's standard input stream, followed by a NUL character. Ignored for pam_sm_setcred(). problem is that it is not ignored when code _pam_exec() is trying to retrieve the auth token when it is called from pam_sm_setcred pam_get_item will set item to null; PAM_AUTHTOK item is set to null when pam_authenticate finishes then a strlen is performed on null and it segfaults if (options->use_first_pass || strcmp(func, "pam_sm_setcred") == 0) { /* don't prompt, only expose existing token */ rc = pam_get_item(pamh, PAM_AUTHTOK, &item); authtok = item; } ...... authtok_size = strlen(authtok) + 1; // <= bombs here -- You are receiving this mail because: You are the assignee for the bug.