aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSiddhesh Poyarekar <siddhesh@redhat.com>2014-03-27 19:49:51 +0530
committerAurelien Jarno <aurelien@aurel32.net>2015-12-20 17:42:13 +0100
commit56b2cf5633f90c722b8f4ed257311b23ebed7399 (patch)
treec812fab893903c2ccca8f57d5f20af3e1c108412
parent2f3bd411aefa9747f17740e9ab06676d51241098 (diff)
downloadglibc-56b2cf5633f90c722b8f4ed257311b23ebed7399.tar
glibc-56b2cf5633f90c722b8f4ed257311b23ebed7399.tar.gz
glibc-56b2cf5633f90c722b8f4ed257311b23ebed7399.tar.bz2
glibc-56b2cf5633f90c722b8f4ed257311b23ebed7399.zip
Return NULL for wildcard values in getnetgrent from nscd (BZ #16759)
getnetgrent is supposed to return NULL for values that are wildcards in the (host, user, domain) triplet. This works correctly with nscd disabled, but with it enabled, it returns a blank ("") instead of a NULL. This is easily seen with the output of `getent netgroup foonet` for a netgroup foonet defined as follows in /etc/netgroup: foonet (,foo,) The output with nscd disabled is: foonet ( ,foo,) while with nscd enabled, it is: foonet (,foo,) The extra space with nscd disabled is due to the fact that `getent netgroup` adds it if the return value from getnetgrent is NULL for either host or user. (cherry picked from commit dd3022d75e6fb8957843d6d84257a5d8457822d5)
-rw-r--r--ChangeLog4
-rw-r--r--NEWS6
-rw-r--r--inet/getnetgrent_r.c14
3 files changed, 18 insertions, 6 deletions
diff --git a/ChangeLog b/ChangeLog
index 3cb4c4d2a1..896b564707 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -4,6 +4,10 @@
* nscd/netgroupcache.c (addinnetgrX): Succeed if triplet has
blank values.
+ [BZ #16759]
+ * inet/getnetgrent_r.c (get_nonempty_val): New function.
+ (nscd_getnetgrent): Use it.
+
2015-11-24 Andreas Schwab <schwab@suse.de>
[BZ #17062]
diff --git a/NEWS b/NEWS
index 9771c0792d..6f295a201a 100644
--- a/NEWS
+++ b/NEWS
@@ -9,9 +9,9 @@ Version 2.19.1
* The following bugs are resolved with this release:
- 15946, 16545, 16574, 16623, 16657, 16695, 16743, 16758, 16878, 16882,
- 16885, 16916, 16932, 16943, 16958, 17048, 17062, 17069, 17079, 17137,
- 17153, 17213, 17263, 17269, 17325, 17555, 18007, 18032, 18287.
+ 15946, 16545, 16574, 16623, 16657, 16695, 16743, 16758, 16759, 16878,
+ 16882, 16885, 16916, 16932, 16943, 16958, 17048, 17062, 17069, 17079,
+ 17137, 17153, 17213, 17263, 17269, 17325, 17555, 18007, 18032, 18287.
* A buffer overflow in gethostbyname_r and related functions performing DNS
requests has been fixed. If the NSS functions were called with a
diff --git a/inet/getnetgrent_r.c b/inet/getnetgrent_r.c
index 62cdfda9cb..f6d064dbb5 100644
--- a/inet/getnetgrent_r.c
+++ b/inet/getnetgrent_r.c
@@ -235,6 +235,14 @@ endnetgrent (void)
}
#ifdef USE_NSCD
+static const char *
+get_nonempty_val (const char *in)
+{
+ if (*in == '\0')
+ return NULL;
+ return in;
+}
+
static enum nss_status
nscd_getnetgrent (struct __netgrent *datap, char *buffer, size_t buflen,
int *errnop)
@@ -243,11 +251,11 @@ nscd_getnetgrent (struct __netgrent *datap, char *buffer, size_t buflen,
return NSS_STATUS_UNAVAIL;
datap->type = triple_val;
- datap->val.triple.host = datap->cursor;
+ datap->val.triple.host = get_nonempty_val (datap->cursor);
datap->cursor = (char *) __rawmemchr (datap->cursor, '\0') + 1;
- datap->val.triple.user = datap->cursor;
+ datap->val.triple.user = get_nonempty_val (datap->cursor);
datap->cursor = (char *) __rawmemchr (datap->cursor, '\0') + 1;
- datap->val.triple.domain = datap->cursor;
+ datap->val.triple.domain = get_nonempty_val (datap->cursor);
datap->cursor = (char *) __rawmemchr (datap->cursor, '\0') + 1;
return NSS_STATUS_SUCCESS;