From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 7814) id B367D385780D; Sat, 28 Aug 2021 00:43:45 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org B367D385780D Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Fangrui Song To: glibc-cvs@sourceware.org Subject: [glibc/google/grte/v5-2.27/master] [BZ #22342] Fix netgroup cache keys. X-Act-Checkin: glibc X-Git-Author: DJ Delorie X-Git-Refname: refs/heads/google/grte/v5-2.27/master X-Git-Oldrev: fbac9a26b2037ba9ec1f364719355ec19570c856 X-Git-Newrev: 9a219419689b444a0af5d29b5917a5f239f8d6aa Message-Id: <20210828004345.B367D385780D@sourceware.org> Date: Sat, 28 Aug 2021 00:43:45 +0000 (GMT) X-BeenThere: glibc-cvs@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Glibc-cvs mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 28 Aug 2021 00:43:45 -0000 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9a219419689b444a0af5d29b5917a5f239f8d6aa commit 9a219419689b444a0af5d29b5917a5f239f8d6aa Author: DJ Delorie Date: Thu Mar 1 23:20:45 2018 -0500 [BZ #22342] Fix netgroup cache keys. Unlike other nscd caches, the netgroup cache contains two types of records - those for "iterate through a netgroup" (i.e. setnetgrent()) and those for "is this user in this netgroup" (i.e. innetgr()), i.e. full and partial records. The timeout code assumes these records have the same key for the group name, so that the collection of records that is "this netgroup" can be expired as a unit. However, the keys are not the same, as the in-netgroup key is generated by nscd rather than being passed to it from elsewhere, and is generated without the trailing NUL. All other keys have the trailing NUL, and as noted in the linked BZ, debug statements confirm that two keys for the same netgroup are added to the cache with two different lengths. The result of this is that as records in the cache expire, the purge code only cleans out one of the two types of entries, resulting in stale, possibly incorrect, and possibly inconsistent cache data. The patch simply includes the existing NUL in the computation for the key length ('key' points to the char after the NUL, and 'group' to the first char of the group, so 'key-group' includes the first char to the NUL, inclusive). [BZ #22342] * nscd/netgroupcache.c (addinnetgrX): Include trailing NUL in key value. Reviewed-by: Carlos O'Donell (cherry picked from commit 1c81d55fc4b07b51adf68558ba74ce975153e580) Diff: --- ChangeLog | 6 ++++++ NEWS | 1 + nscd/netgroupcache.c | 2 +- 3 files changed, 8 insertions(+), 1 deletion(-) diff --git a/ChangeLog b/ChangeLog index e7f672a8e2..baff9fa479 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,9 @@ +2018-03-01 DJ Delorie + + [BZ #22342] + * nscd/netgroupcache.c (addinnetgrX): Include trailing NUL in + key value. + 2018-02-26 Dmitry V. Levin [BZ #22433] diff --git a/NEWS b/NEWS index d6da060f8b..ad425f2c37 100644 --- a/NEWS +++ b/NEWS @@ -11,6 +11,7 @@ The following bugs are resolved with this release: [6889] 'PWD' mentioned but not specified [16335] Feature test macro documentation incomplete and out of date + [22342] NSCD not properly caching netgroup [22638] sparc: static binaries are broken if glibc is built by gcc configured with --enable-default-pie [22735] Misleading typo in time.h source comment regarding CLOCKS_PER_SECOND diff --git a/nscd/netgroupcache.c b/nscd/netgroupcache.c index b832c9315f..2f187b208c 100644 --- a/nscd/netgroupcache.c +++ b/nscd/netgroupcache.c @@ -480,7 +480,7 @@ addinnetgrX (struct database_dyn *db, int fd, request_header *req, { const char *group = key; key = (char *) rawmemchr (key, '\0') + 1; - size_t group_len = key - group - 1; + size_t group_len = key - group; const char *host = *key++ ? key : NULL; if (host != NULL) key = (char *) rawmemchr (key, '\0') + 1;