]> git.ipfire.org Git - thirdparty/shadow.git/log
thirdparty/shadow.git
4 weeks agostrchriscntrl: reject C1 control bytes (0x80-0x9F)
KhaelK-Praetorian [Wed, 11 Mar 2026 03:04:55 +0000 (22:04 -0500)] 
strchriscntrl: reject C1 control bytes (0x80-0x9F)

glibc's iscntrl() does not classify C1 control bytes as control
characters in any locale. The iscntrl() check was added as part of the
fix for CVE-2023-29383, which blocked C0 control characters, but C1
bytes were never considered.

The byte 0x9B is the C1 encoding of CSI (Control Sequence Introducer),
equivalent to ESC [. On terminals that interpret C1 codes (VTE-based
terminals such as GNOME Terminal, Tilix, Terminator, XFCE Terminal),
an attacker can inject terminal escape sequences into GECOS fields via
chfn. This allows visual spoofing of /etc/passwd output, for example
making a user's UID appear as 0 when viewed with cat.

Explicitly check for bytes in the 0x80-0x9F range in strchriscntrl()
so that valid_field() returns -1 (rejected) instead of 1 (non-ASCII
warning) for these bytes.

Before (unpatched chfn accepts C1 bytes and writes them to /etc/passwd):

  $ cat /etc/passwd | grep ubuntu
  ubuntu:x:1000:1000:ubuntu,,,:/home/ubuntu:/bin/bash
  $ chfn -r $'\xc2\x9b17D0\xc2\x9b3P\xc2\x9b1C0\xc2\x9b3P\xc2\x9b1Croot\xc2\x9b8m'
  Password:
  chfn: room number with non-ASCII characters: [...]
  $ cat /etc/passwd | grep ubuntu
  ubuntu:x:0:0:root,,:/home/ubuntu:/bin/bash

After (patched chfn rejects C1 bytes, /etc/passwd unchanged):

  $ chfn -r $'\xc2\x9b17D0\xc2\x9b3P\xc2\x9b1C0\xc2\x9b3P\xc2\x9b1Croot\xc2\x9b8m'
  Password:
  chfn: invalid room number: [...]
  $ cat /etc/passwd | grep ubuntu
  ubuntu:x:1000:1000:ubuntu,,,:/home/ubuntu:/bin/bash

Tested on Shadow 4.17.4-2ubuntu2 (Ubuntu 25.10, aarch64).

4 weeks agousermod: Create shadow entry with -e 0 or -f 0
Tobias Stoeckmann [Wed, 11 Mar 2026 20:15:10 +0000 (21:15 +0100)] 
usermod: Create shadow entry with -e 0 or -f 0

If -e 0 or -f 0 are supplied but no shadow entry exists, these flags are
silently ignored. Internally, the supplied values (0) are compared with
static long values which are initially 0 as well. If they are identical,
usermod drops the flags.

This does not match usermod's manual page, which states that a missing
shadow entry is created. This is also true for any other valid command
line values, e.g. -e 1 or -f 1.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
4 weeks agoTests: Add user with existing UID without -o flag
aborah-sudo [Wed, 11 Mar 2026 08:27:42 +0000 (13:57 +0530)] 
Tests: Add user with existing UID without -o flag

This is the transformation to Python of the test located in
`04_useradd_add_user_with_existing_UID_fail`, which checks that `useradd` fails to create a new user with existing UID without -o flag

4 weeks agolib/commonio.c: Diagnose non-text files
Alejandro Colomar [Wed, 11 Mar 2026 22:07:44 +0000 (23:07 +0100)] 
lib/commonio.c: Diagnose non-text files

Closes: <https://github.com/shadow-maint/shadow/issues/1581>
Reported-by: Tim Zhou <tizhou@redhat.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
4 weeks agoci: run unit-tests in Ubuntu build
Iker Pedrosa [Tue, 10 Mar 2026 09:32:47 +0000 (10:32 +0100)] 
ci: run unit-tests in Ubuntu build

Run unit-tests as part of the Ubuntu build

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
4 weeks agoci: add missing `cmocka` dependency for Ubuntu runners
Iker Pedrosa [Tue, 10 Mar 2026 09:48:16 +0000 (10:48 +0100)] 
ci: add missing `cmocka` dependency for Ubuntu runners

`cmocka` is required to run unit-tests

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
4 weeks agoTests: Add a new user with specified UID and GID
aborah-sudo [Mon, 9 Mar 2026 05:50:21 +0000 (11:20 +0530)] 
Tests: Add a new user with specified UID and GID

This is the transformation to Python of the test located in
`tests/usertools/01/04_useradd_specified_UID_and_GID.test`,
which checks that `useradd` is able to create a new user with specified uid and gid

5 weeks agoTests: Create user with custom uid options
aborah-sudo [Wed, 4 Mar 2026 06:59:16 +0000 (12:29 +0530)] 
Tests: Create user with custom uid options

This is the transformation to Python of the test located in
`tests/usertools/01/04_useradd_specified_UID.test`,

which checks that `useradd` is able to create a new user with specified uid

5 weeks agolib/io/syslog.h: SYSLOG_C(): Call setlocale(3) and free(3) unconditionally
Alejandro Colomar [Wed, 23 Jul 2025 00:23:57 +0000 (02:23 +0200)] 
lib/io/syslog.h: SYSLOG_C(): Call setlocale(3) and free(3) unconditionally

Both setlocale(3) and free(3) are okay to call with a null pointer.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
5 weeks agolib/io/syslog.h: SYSLOG_C(): Use a single local variable
Alejandro Colomar [Wed, 23 Jul 2025 17:59:02 +0000 (19:59 +0200)] 
lib/io/syslog.h: SYSLOG_C(): Use a single local variable

There's no need for two variables, and this avoids one assignment.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
5 weeks agolib/io/syslog.h: Rename local variable
Alejandro Colomar [Wed, 23 Jul 2025 17:58:07 +0000 (19:58 +0200)] 
lib/io/syslog.h: Rename local variable

Signed-off-by: Alejandro Colomar <alx@kernel.org>
5 weeks agolib/io/syslog.h: SYSLOG_C(): Split code to helper macro
Alejandro Colomar [Wed, 23 Jul 2025 17:50:04 +0000 (19:50 +0200)] 
lib/io/syslog.h: SYSLOG_C(): Split code to helper macro

The name of this macro makes it more evident what it does.  It's a
C-locale version of syslog(3).  We need to implement it as a macro
so that arguments such as strerror(3) are evaluated after setting
the C locale.  This would be impossible with a function.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
5 weeks agolib/: Move <syslog.h> wrappers to "io/syslog.h"
Alejandro Colomar [Tue, 22 Jul 2025 23:41:11 +0000 (01:41 +0200)] 
lib/: Move <syslog.h> wrappers to "io/syslog.h"

Signed-off-by: Alejandro Colomar <alx@kernel.org>
5 weeks agoTests: Create user with comment, expiredate, inactive, shell and custom home
aborah-sudo [Mon, 2 Mar 2026 07:04:18 +0000 (12:34 +0530)] 
Tests: Create user with comment, expiredate, inactive, shell and custom home

This is the transformation to Python of the test located in
`tests/usertools/01/03_useradd_additional_options.test`, which checks that
`useradd` is able to create a new user with comment, expiredate, inactive, shell and custom home

5 weeks agoFix build failure on hosts with gcc 10
Chen Qi [Wed, 11 Feb 2026 05:17:04 +0000 (05:17 +0000)] 
Fix build failure on hosts with gcc 10

We cannot just uname these unused parameters because gcc 10
need them. There will be error like below with gcc 10:

  lib/copydir.c:103:11: error: parameter name omitted

The Debian bullseye uses gcc 10 by default.

Most of the changes are done manually. Some changes in tests/unit
are done via the following shell command:
sed -i -e 's#void \*\*#MAYBE_UNUSED void \*\* _1#g'  tests/unit/test_*.c

Closes: <https://github.com/shadow-maint/shadow/issues/1530>
Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
5 weeks agoci: run privileged system tests in CI
Hadi Chokr [Thu, 12 Feb 2026 11:20:01 +0000 (12:20 +0100)] 
ci: run privileged system tests in CI

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
5 weeks agotests: add privileged useradd test for BTRFS subvolume homes
Hadi Chokr [Thu, 12 Feb 2026 11:17:52 +0000 (12:17 +0100)] 
tests: add privileged useradd test for BTRFS subvolume homes

Add a privileged system test that verifies useradd can create home
directories as BTRFS subvolumes.

This test requires elevated privileges to use:
The BTRFS filesystem Framework class to create a /home directory on
BTRFS and check if the Users Home directory is a BTRFS Subvolume.

The test is intentionally isolated and excluded from default test runs
to prevent accidental execution on host systems.

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
5 weeks agotests: add privileged topology and test configuration
Hadi Chokr [Thu, 12 Feb 2026 11:16:39 +0000 (12:16 +0100)] 
tests: add privileged topology and test configuration

Extend the Python system test framework with a dedicated privileged
topology and configuration, while keeping privileged tests excluded
by default. And include a BTRFS Framework class for BTRFS Operations.

This ensures:
- Clear separation between safe and destructive tests
- No accidental execution of privileged tests in normal CI or local runs
- Explicit opt-in for privileged environments

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
5 weeks agodoc: document privileged containers and privileged system tests
Hadi Chokr [Thu, 12 Feb 2026 11:14:54 +0000 (12:14 +0100)] 
doc: document privileged containers and privileged system tests

Document the distinction between unprivileged and privileged execution
modes for containers and system tests.

Add explicit warnings that privileged tests must never be run on the
host system, as they may mount filesystems, create loop devices, or
modify kernel-visible state.

Provide clear guidance on when privileged tests are acceptable and how
to execute them safely in disposable environments.

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
5 weeks agoshare: add privileged container support for CI and system tests
Hadi Chokr [Thu, 12 Feb 2026 11:13:46 +0000 (12:13 +0100)] 
share: add privileged container support for CI and system tests

Introduce opt-in privileged container execution for CI and local runs.
This enables filesystem-level tests (e.g. BTRFS, mounts) while keeping
unprivileged execution as the default and safe path.

Changes include:
- Separate privileged and unprivileged builders
- Conditional Ansible roles and inventories
- Privileged test execution wiring
- --privileged support in container-build.sh

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
5 weeks agolib/string/strcmp/: str{,case}eq(): Simplify implementation
Alejandro Colomar [Thu, 26 Feb 2026 16:54:24 +0000 (17:54 +0100)] 
lib/string/strcmp/: str{,case}eq(): Simplify implementation

A one-liner macro is simpler, and works just fine.

We don't need the function at all, since we don't use it as a callback.
The macro changes the return type, but we don't really care about that
detail; we could cast it to bool, but we don't really need that, so keep
it simple.

Reviewed-by: Kees Cook <kees@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
5 weeks agolib/string/strchr/: strnul(): Simplify implementation
Alejandro Colomar [Thu, 19 Feb 2026 01:01:09 +0000 (02:01 +0100)] 
lib/string/strchr/: strnul(): Simplify implementation

This avoids an __auto_type local variable, and a GNU statement
expression.

Reviewed-by: Kees Cook <kees@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks agolib/defines.h, lib/, src/: Redefine SYSLOG() as a variadic macro
Alejandro Colomar [Tue, 22 Jul 2025 22:08:22 +0000 (00:08 +0200)] 
lib/defines.h, lib/, src/: Redefine SYSLOG() as a variadic macro

The double parentheses were used to fake a variadic macro with a
non-variadic one.  With a variadic macro, we remove the weird double
parentheses that were needed to call this macro, which BTW were
error-prone.  This would have prevented the bug fixed in 3f5ae5d5f1fd
(2025-09-10; "src/su.c: Fix incorrect (non-matching) parentheses").

Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks agousermod: Add option to automatically find subordinate IDs
Richard Weinberger [Mon, 23 Feb 2026 20:19:21 +0000 (21:19 +0100)] 
usermod: Add option to automatically find subordinate IDs

Tools such as useradd(8) automatically select subordinate UID and GID
ranges based on settings in login.defs.
But when one wants to add subordinate IDs to an existing user, these
ranges have to be specified manually using the -w and -v options
of usermod(8).

Add a new -S / --add-subids option to usermod(8) which will, just like
useradd(8), find a range based on the settings in login.defs.

Signed-off-by: Richard Weinberger <richard@nod.at>
6 weeks agolib/string/README: streq(3) and strnul(3) are in libc
Alejandro Colomar [Sun, 22 Feb 2026 14:49:17 +0000 (15:49 +0100)] 
lib/string/README: streq(3) and strnul(3) are in libc

streq(3) and strnul(3) are now part of a libc implementation: gnulib.
They are also documented in a manual page.  Thus, refer to them as
streq(3) and strnul(3).

Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks agodoc/contributions/coding_style.md: Refer to the man-pages style guide
Alejandro Colomar [Wed, 25 Feb 2026 11:54:59 +0000 (12:54 +0100)] 
doc/contributions/coding_style.md: Refer to the man-pages style guide

Reported-by: "Evgeny Grin (Karlson2k)" <k2k@drgrin.dev>
Reported-by: Richard Weinberger <richard@nod.at>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks agouseradd: Correctly set subuid/subgid when using -F
ndostert [Mon, 23 Feb 2026 20:50:16 +0000 (21:50 +0100)] 
useradd: Correctly set subuid/subgid when using -F

The -F flag should bypass the -r flag and UID checks.

Closes: <shadow-maint#1255>
Signed-off-by: ndostert <crawax@cwxlab.fr>
Co-authored-by: Alejandro Colomar <alx@kernel.org>
Fixes: 3f7a72e9677b (2022-08-01; "useradd: add -F option for updating /etc/sub[ig]id for system accounts")
6 weeks ago*/: chgpasswd(8): -m,--md5: Remove option
Alejandro Colomar [Sat, 27 Dec 2025 11:52:14 +0000 (12:52 +0100)] 
*/: chgpasswd(8): -m,--md5: Remove option

Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks ago*/: chpasswd(8): -m,--md5: Remove option
Alejandro Colomar [Sat, 27 Dec 2025 11:36:11 +0000 (12:36 +0100)] 
*/: chpasswd(8): -m,--md5: Remove option

This was the command-line equivalent of MD5_CRYPT_ENAB.  It deserves
the same fate.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks agolib/salt.c: Compact conditionals
Alejandro Colomar [Sat, 27 Dec 2025 01:07:15 +0000 (02:07 +0100)] 
lib/salt.c: Compact conditionals

Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks ago*/: Remove support for MD5_CRYPT_ENAB
Alejandro Colomar [Sat, 27 Dec 2025 01:02:24 +0000 (02:02 +0100)] 
*/: Remove support for MD5_CRYPT_ENAB

It has been deprecated for a very long time.  In fact, the first commit
that documented MD5_CRYPT_ENAB already documented it as deprecated.
6e3ad7a27546 (2007-11-20).

Signed-off-by: Alejandro Colomar <alx@kernel.org>
6 weeks ago*/: expiry(1): Remove program
Alejandro Colomar [Mon, 15 Dec 2025 23:18:45 +0000 (00:18 +0100)] 
*/: expiry(1): Remove program

Password expiration is deprecated, and will be eventually removed.

The functionality of expiry(1) is the most superfluous of password
expiry and can be removed early.  This shouldn't conflict with any
existing regulations about password expiry.

Link: <https://github.com/shadow-maint/shadow/pull/1432>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agosrc/: Cosmetic
Alejandro Colomar [Fri, 26 Dec 2025 17:29:10 +0000 (18:29 +0100)] 
src/: Cosmetic

Fix style.

Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks ago*: Make support for SHA256 and SHA512 unconditional
Alejandro Colomar [Fri, 26 Dec 2025 14:14:17 +0000 (15:14 +0100)] 
*: Make support for SHA256 and SHA512 unconditional

This is necessary for later changing the fallback from the insecure DES
to something secure such as SHA512.

Link: <https://github.com/shadow-maint/shadow/issues/1278>
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Cc: Andre Boscatto <andreboscatto@gmail.com>
Cc: Iker Pedrosa <ipedrosa@redhat.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agolib/btrfs.c: Remove hardcoded Paths and resolve them via env to increase portability
Hadi Chokr [Sat, 24 Jan 2026 17:54:33 +0000 (18:54 +0100)] 
lib/btrfs.c: Remove hardcoded Paths and resolve them via env to increase portability

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
7 weeks agolib/setupenv.c: Remove code wrapped in '#if 0'
Alejandro Colomar [Sat, 3 Jan 2026 23:21:04 +0000 (00:21 +0100)] 
lib/setupenv.c: Remove code wrapped in '#if 0'

This has not been tested in a long time --if ever--.

If we ever want to implement something, we should start from scratch.
But if we've survived for so long without it, I suspect we don't want
it at all.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agoconfigure.ac: fix checks for lastlog support
Mike Gilbert [Wed, 18 Feb 2026 19:00:51 +0000 (14:00 -0500)] 
configure.ac: fix checks for lastlog support

The check for lastlog.h was removed by mistake in a previous changset.

The configure script should terminate with an error if lastlog support
was requested but lastlog.h is not available.

Partial functionality is provided if ll_host is not a member of
struct lastlog.

Fixes: 1bdcfa8d3710 (2023-07-15; "lastlog: stop building by default")
Fixes: 9eea4bc9cf95 (2024-11-12, 2025-02-07; "configure.ac: Remove unused AC_CHECK_HEADERS() checks")
Signed-off-by: Mike Gilbert <floppym@gentoo.org>
7 weeks agosrc/useradd.c: Refactor long expression into many simple conditionals
Alejandro Colomar [Wed, 18 Feb 2026 20:10:05 +0000 (21:10 +0100)] 
src/useradd.c: Refactor long expression into many simple conditionals

Co-authored-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agosrc/useradd.c: Factor out logic to helper functions
Alejandro Colomar [Wed, 18 Feb 2026 20:02:10 +0000 (21:02 +0100)] 
src/useradd.c: Factor out logic to helper functions

Co-authored-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agolib/prefix_flag.c: Remove 't' flag from fopen(3)
Alejandro Colomar [Wed, 18 Feb 2026 13:54:43 +0000 (14:54 +0100)] 
lib/prefix_flag.c: Remove 't' flag from fopen(3)

It is a Windows extension ignored by musl and glibc.  It is not in POSIX
nor ISO C.

Since most of our calls to fopen(3) don't use it, let's be consistent
and not use it anywhere.

Closes: <https://github.com/shadow-maint/shadow/issues/1541>
Acked-by: Mike Frysinger <vapier@gentoo.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agotests/unit/test_chkhash.c: add invalid hashes
Iker Pedrosa [Fri, 6 Feb 2026 15:20:37 +0000 (16:20 +0100)] 
tests/unit/test_chkhash.c: add invalid hashes

Add comprehensive negative testing condition validation:
- Invalid algorithm prefixes and hash length validation
- Invalid delimiter handling
- Invalid salt characters and rounds parameter testing

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agotests/unit/test_chkhash.c: add edge test cases
Iker Pedrosa [Fri, 6 Feb 2026 15:18:52 +0000 (16:18 +0100)] 
tests/unit/test_chkhash.c: add edge test cases

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agotests/unit/test_chkhash.c: add special test cases
Iker Pedrosa [Wed, 4 Feb 2026 10:15:56 +0000 (11:15 +0100)] 
tests/unit/test_chkhash.c: add special test cases

*, ! and empty strings are special valid cases for shadow's second
field. Add test cases for them.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agotests/unit/test_chkhash.c: add MD5 and DES hash validation tests
Iker Pedrosa [Wed, 4 Feb 2026 09:31:47 +0000 (10:31 +0100)] 
tests/unit/test_chkhash.c: add MD5 and DES hash validation tests

Add basic MD5 and DES algorithm validation tests.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agotests/unit/test_chkhash.c: add SHA-256 hash validation tests
Iker Pedrosa [Wed, 4 Feb 2026 09:22:29 +0000 (10:22 +0100)] 
tests/unit/test_chkhash.c: add SHA-256 hash validation tests

Add comprehensive SHA-256 algorithm validation tests covering rounds and
salt cases.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agotests/unit/test_chkhash.c: add SHA-512 hash validation tests
Iker Pedrosa [Sun, 1 Feb 2026 14:11:20 +0000 (15:11 +0100)] 
tests/unit/test_chkhash.c: add SHA-512 hash validation tests

Add comprehensive SHA-512 algorithm validation tests covering rounds and
salt cases.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agotests/unit/test_chkhash.c: add bcrypt hash validation tests
Iker Pedrosa [Sun, 1 Feb 2026 09:46:18 +0000 (10:46 +0100)] 
tests/unit/test_chkhash.c: add bcrypt hash validation tests

Add comprehensive bcrypt algorithm validation tests covering all
variants ($2a$, $2b$, $2x$, $2y$) with different cost factors.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agotests/unit/test_chkhash.c: add unit tests for `is_valid_hash()`
Iker Pedrosa [Fri, 30 Jan 2026 14:56:23 +0000 (15:56 +0100)] 
tests/unit/test_chkhash.c: add unit tests for `is_valid_hash()`

Introduce unit testing infrastructure for the `is_valid_hash()`
function. Add yescrypt algorithm validation tests.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
7 weeks agolib/chkhash.c: fix yescrypt hash length comment
Iker Pedrosa [Fri, 6 Feb 2026 15:31:56 +0000 (16:31 +0100)] 
lib/chkhash.c: fix yescrypt hash length comment

Fix misleading comment that stated "43-char (minimum) hash" when
the actual regex pattern requires exactly 43 characters. Update
comment to accurately reflect the implementation behavior.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Alejandro Colomar <alx@kernel.org>
7 weeks agoconfigure.ac: simplify fgetpwent_r check
Mike Gilbert [Tue, 17 Feb 2026 18:48:41 +0000 (13:48 -0500)] 
configure.ac: simplify fgetpwent_r check

Signed-off-by: Mike Gilbert <floppym@gentoo.org>
7 weeks agoconfigure.ac: drop check for setpgrp
Mike Gilbert [Tue, 17 Feb 2026 18:44:55 +0000 (13:44 -0500)] 
configure.ac: drop check for setpgrp

The last use was dropped in eec97ce4c5a9fa57c387affeedd7a40c435b2b1f.

Signed-off-by: Mike Gilbert <floppym@gentoo.org>
7 weeks agoconfigure.ac: drop AC_FUNC_UTIME_NULL
Mike Gilbert [Tue, 17 Feb 2026 18:42:01 +0000 (13:42 -0500)] 
configure.ac: drop AC_FUNC_UTIME_NULL

The codebase does not utilize the resulting HAVE_UTIME_NULL macro,
making this check pointless.

Signed-off-by: Mike Gilbert <floppym@gentoo.org>
7 weeks agoconfigure.ac: drop unused libsubid_abi variable
Mike Gilbert [Tue, 17 Feb 2026 18:39:21 +0000 (13:39 -0500)] 
configure.ac: drop unused libsubid_abi variable

Signed-off-by: Mike Gilbert <floppym@gentoo.org>
7 weeks agoMerge remote-tracking branch 'alx/k'
Serge Hallyn [Tue, 17 Feb 2026 14:03:51 +0000 (08:03 -0600)] 
Merge remote-tracking branch 'alx/k'

7 weeks agolib/utmp.c: get_current_utmp(): Use memdup_T() instead of its pattern
Alejandro Colomar [Wed, 16 Jul 2025 15:44:26 +0000 (17:44 +0200)] 
lib/utmp.c: get_current_utmp(): Use memdup_T() instead of its pattern

Reviewed-by: "Evgeny Grin (Karlson2k)" <k2k@drgrin.dev>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agolib/string/strdup/: memdup_T(): Add API
Alejandro Colomar [Wed, 16 Jul 2025 15:38:48 +0000 (17:38 +0200)] 
lib/string/strdup/: memdup_T(): Add API

And update lib/string/README:
-  Rename MEMDUP() => memdup_T(), as we're moving away from upper-case
   macros to ones that actually say something about what they do in the
   name (_T for type-safe, and _a for array-safe).
-  memdup() is unimplemented.

Cc: "Evgeny Grin (Karlson2k)" <k2k@drgrin.dev>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agolib/utmp.c: get_current_utmp(): Use simple assignment instead of memcpy(3)
Alejandro Colomar [Wed, 10 Dec 2025 14:21:15 +0000 (15:21 +0100)] 
lib/utmp.c: get_current_utmp(): Use simple assignment instead of memcpy(3)

memcpy(3) is overkill, and much more dangerous than simple assignment.
Simple assignment adds type safety, and removes any possibility of
buffer overflow due to accidentally specifying a wrong size.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agolib/utmp.c: get_current_utmp(): Don't exit(3) from library code
Alejandro Colomar [Wed, 16 Jul 2025 15:41:33 +0000 (17:41 +0200)] 
lib/utmp.c: get_current_utmp(): Don't exit(3) from library code

This function already returned NULL on some errors.  It didn't make any
sense to exit(3) on allocation failure.  Instead, just return NULL.

Reviewed-by: "Evgeny Grin (Karlson2k)" <k2k@drgrin.dev>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
7 weeks agoUpdate Serge's certificate
Serge Hallyn [Sun, 15 Feb 2026 02:14:28 +0000 (20:14 -0600)] 
Update Serge's certificate

Closes #1525

7 weeks agoconfigure.ac: fix detection of secure_getenv
Mike Gilbert [Mon, 16 Feb 2026 20:36:37 +0000 (15:36 -0500)] 
configure.ac: fix detection of secure_getenv

lib/defines.h was looking for HAVE_SECURE_GETENV instead of of
HAS_SECURE_GETENV as defined in configure. This resulted in
shadow_getenv always being defined to getenv.

AC_CHECK_FUNC is linker test; it does not check for declarations.
Replace this with AC_CHECK_DECLS/HAVE_DECL_SECURE_GETENV.

Fixes: 3d921155e0a7 (2019-03-31; "gettime: Use secure_getenv over getenv.")
Signed-off-by: Mike Gilbert <floppym@gentoo.org>
7 weeks agoconfigure.ac: remove redundant check for pam_fail_delay
Mike Gilbert [Mon, 16 Feb 2026 21:01:18 +0000 (16:01 -0500)] 
configure.ac: remove redundant check for pam_fail_delay

This check was introduced in 276e406c (support for OpenPAM).
OpenPAM has never declared pam_fail_delay.

linux-pam has defined HAVE_PAM_FAIL_DELAY in its headers for a very long
time (before version history).

Signed-off-by: Mike Gilbert <floppym@gentoo.org>
7 weeks agoClarify allowed user and group names
Marko Myllynen [Mon, 16 Feb 2026 15:40:20 +0000 (17:40 +0200)] 
Clarify allowed user and group names

Resolves #1536

8 weeks agosrc/passwd.c: add audit messages for aging operations
Iker Pedrosa [Fri, 13 Feb 2026 08:09:55 +0000 (09:09 +0100)] 
src/passwd.c: add audit messages for aging operations

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
8 weeks agosrc/passwd.c: add audit messages for passwd
Iker Pedrosa [Fri, 13 Feb 2026 08:08:46 +0000 (09:08 +0100)] 
src/passwd.c: add audit messages for passwd

Add comprehensive audit messages for password operations, including
unlock, delete and expire operations.

Change update_shadow() to look up the actual target user instead of
using a dummy `passwd` struct. This ensures audit logging gets the
correct target UID. Audit logs should record the UID of the user being
affected (target), not the UID of whoever is running the passwd command
(source).

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
8 weeks agotests/unit: improve .gitignore to ignore all test executables
Iker Pedrosa [Wed, 11 Feb 2026 09:12:17 +0000 (10:12 +0100)] 
tests/unit: improve .gitignore to ignore all test executables

Replace specific test file entries with pattern-based ignoring of all
test_* executables while preserving test_*.c source files.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
2 months agokeys/: Refresh my public key 1527/head
Alejandro Colomar [Mon, 2 Feb 2026 13:55:46 +0000 (14:55 +0100)] 
keys/: Refresh my public key

Updated with:

$ gpg --armor \
--output A9348594CE31283A826FBDD8D57633D441E25BB5.asc \
--export alx@kernel.org;

Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 months agoupdated Dutch translation
Frans Spiesschaert [Sun, 1 Feb 2026 19:41:10 +0000 (20:41 +0100)] 
updated Dutch translation

2 months agoetc/pam.d/: Remove the old unused PAM configs for setuid account tools
Hadi Chokr [Tue, 27 Jan 2026 14:36:26 +0000 (15:36 +0100)] 
etc/pam.d/: Remove the old unused PAM configs for setuid account tools

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
Reviewed-by: Alejandro Colomar <alx@kernel.org>
2 months agosrc/: Disable and remove account-tools-setuid conditionals
Hadi Chokr [Tue, 27 Jan 2026 14:35:42 +0000 (15:35 +0100)] 
src/: Disable and remove account-tools-setuid conditionals

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
Reviewed-by: Alejandro Colomar <alx@kernel.org>
2 months agoconfigure.ac: permanently remove setuid account management tools
Hadi Chokr [Tue, 27 Jan 2026 14:34:33 +0000 (15:34 +0100)] 
configure.ac: permanently remove setuid account management tools

Signed-off-by: Hadi Chokr <hadichokr@icloud.com>
Reviewed-by: Alejandro Colomar <alx@kernel.org>
2 months agolib/chkhash.c: fix escaping in SHA-256 / SHA-512 / MD5 regexes
Adam Williamson [Tue, 27 Jan 2026 23:11:07 +0000 (15:11 -0800)] 
lib/chkhash.c: fix escaping in SHA-256 / SHA-512 / MD5 regexes

`\\n` inside square brackets doesn't include or exclude the
newline character. It includes or excludes a literal slash and
the literal character 'n'.

Fixes: c44f1e096a19 (2025-07-20; "chpasswd: Check hash before write when using -e")
Closes: <https://github.com/shadow-maint/shadow/issues/1519>
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2 months agoman/po: copy over login.defs.d/*.xml
Serge Hallyn [Fri, 23 Jan 2026 02:07:48 +0000 (20:07 -0600)] 
man/po: copy over login.defs.d/*.xml

When doing update-po, we copy man/*.xml into a tempdir, but
some of those files reference login.defs.d/*.xml, so copy
over those as well.

Signed-off-by: Serge Hallyn <serge@hallyn.com>
Tested-by: Alejandro Colomar <alx@kernel.org>
2 months agoman/shadow.5.xml: Document "*"
Alejandro Colomar [Fri, 16 Jan 2026 00:52:32 +0000 (01:52 +0100)] 
man/shadow.5.xml: Document "*"

Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 months agolib/chkhash.c: is_valid_hash(): Comment meaning of !hash and *
Alejandro Colomar [Thu, 15 Jan 2026 00:24:10 +0000 (01:24 +0100)] 
lib/chkhash.c: is_valid_hash(): Comment meaning of !hash and *

Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 months agolib/chkhash.c: is_valid_hash(): Update comment
Alejandro Colomar [Thu, 15 Jan 2026 00:14:46 +0000 (01:14 +0100)] 
lib/chkhash.c: is_valid_hash(): Update comment

This checks the entire shadow(5) 2nd field, which is more than just
a hash.

Reported-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 months agolib/chkhash.c: is_valid_hash(): Accept an empty hash
Alejandro Colomar [Thu, 15 Jan 2026 00:11:52 +0000 (01:11 +0100)] 
lib/chkhash.c: is_valid_hash(): Accept an empty hash

It represents a passwordless account.
That is discouraged, but accepted.

Fixes: c44f1e096a19 (2025-07-20; "chpasswd: Check hash before write when using -e")
Link: <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1124835>
Reported-by: Marc 'Zugschlus' Haber <mh+githubvisible@zugschlus.de>
Reported-by: "Serge E. Hallyn" <serge@hallyn.com>
Reported-by: Adam Williamson <awilliam@redhat.com>
Co-authored-by: "Serge E. Hallyn" <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 months agotests/system/framework/utils/tools.py: apply style fix for tuple unpacking
Iker Pedrosa [Wed, 21 Jan 2026 08:23:31 +0000 (09:23 +0100)] 
tests/system/framework/utils/tools.py: apply style fix for tuple unpacking

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
2 months agoRevert "src/usermod.c: Remove optimizations"
Alejandro Colomar [Fri, 16 Jan 2026 23:56:21 +0000 (00:56 +0100)] 
Revert "src/usermod.c: Remove optimizations"

This wasn't only an optimization; it also skipped some checks that were
now spuriously triggering errors.  We may be able to get rid of the
optimizations, but that will need more analysis.  For now, let's revert
to a known-good state.

Fixes: 6a8a25dc7de6 (2025-10-15; "src/usermod.c: Remove optimizations")
Reverts: 6a8a25dc7de6 (2025-10-15; "src/usermod.c: Remove optimizations")
Closes: <https://github.com/shadow-maint/shadow/issues/1509>
Reported-by: Adam Williamson <awilliam@redhat.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 months agosrc/usermod.c: -U: Report E_PASSWORDLESS on error due to passwordless account
Alejandro Colomar [Mon, 5 Jan 2026 23:01:07 +0000 (00:01 +0100)] 
src/usermod.c: -U: Report E_PASSWORDLESS on error due to passwordless account

Reproducer:

$ useradd foo
$ grep foo /etc/passwd /etc/shadow
/etc/passwd:foo:x:1001:1001::/home/foo:/usr/bin/bash
/etc/shadow:foo:!:20458:0:99999:7:::
$ usermod -U testuser
usermod: unlocking the user's password would result in a passwordless account.
You should set a password with usermod -p to unlock this user's password.
$ echo $?
0
$ grep foo /etc/passwd /etc/shadow
/etc/passwd:foo:x:1001:1001::/home/foo:/usr/bin/bash
/etc/shadow:foo:!:20458:0:99999:7:::

The program failed (didn't change anything, and reported the problem to
stderr) but reported success (0).  After this patch, the error is
reported as E_PASSWORDLESS (20).

Closes: <https://github.com/shadow-maint/shadow/issues/1479>
Reported-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Acked-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 months agolib/commonio.c: Drop lrename
Tobias Stoeckmann [Sun, 11 Jan 2026 14:23:26 +0000 (15:23 +0100)] 
lib/commonio.c: Drop lrename

The lrename function follows symlinks when renaming files. Since the
source is a temporary file and the target is the database file itself,
which is opened with O_NOFOLLOW, this function is only useful for an
attacker who manages to win some form of race.

Fixes: 0fa908302660 (2007-10-07; "[svn-upgrade] Integrating new upstream version, shadow (4.0.16)")
Fixes: 391a3847157c (2010-03-04; "2010-01-30 Paweł Hajdan, Jr. <phajdan.jr@gentoo.org>")
Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agolib/commonio.c: Call utime for correct target
Tobias Stoeckmann [Wed, 14 Jan 2026 21:26:00 +0000 (22:26 +0100)] 
lib/commonio.c: Call utime for correct target

Since tmpf has been already renamed to target at this point, call utime
with target instead of tmpf.

Fixes: f8732b17dd1d (2026-01-14; "lib/commonio.c: Use unpredictable temporary names")
Reported-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agovipw: Set correct pattern for fmkomstemp
Tobias Stoeckmann [Wed, 14 Jan 2026 21:58:51 +0000 (22:58 +0100)] 
vipw: Set correct pattern for fmkomstemp

The fmkomstemp call requires a suffix of XXXXXX for correct operation.
Do so in TCB case as well.

Note: If something fails and the file resides in this directory, it
could be interpreted as a username. Use the ',' character as an illegal
character to prevent shadow tools from erroneously accessing this file
and assuming that the user actually exists.

Fixes: a5b3d56e2902 (2026-01-09; "vipw: Use fmkomstemp for temporary file")
Reported-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agovipw: Set ownership, then mode
Tobias Stoeckmann [Wed, 14 Jan 2026 18:58:40 +0000 (19:58 +0100)] 
vipw: Set ownership, then mode

This is a safer approach, which handles cases in which a file would have
less permissions for a group than others.

A rare edge case, but let's be safe than sorry.

Reported-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agovipw: Prefer fchmod/fchown over chmod/chown
Tobias Stoeckmann [Wed, 14 Jan 2026 18:57:00 +0000 (19:57 +0100)] 
vipw: Prefer fchmod/fchown over chmod/chown

Use file descriptor functions when file descriptor is available, instead
of path based operations. The latter resolve symbolic links and are
prone to race conditions.

Reported-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agolib/commonio.c: Larger buffer size for file names
Tobias Stoeckmann [Mon, 12 Jan 2026 17:29:54 +0000 (18:29 +0100)] 
lib/commonio.c: Larger buffer size for file names

Make sure that enough bytes exist for file name of temporary file which
is used to construct the next database file.

While at it, use a better variable name.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agolib/commonio.c: Use unpredictable temporary names
Tobias Stoeckmann [Sun, 11 Jan 2026 15:33:16 +0000 (16:33 +0100)] 
lib/commonio.c: Use unpredictable temporary names

Make sure that an attacker with sufficient privileges cannot simply
create a file with expected temporary name to retrieve content of
previous and/or future database.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agolib/commonio.c: Unlink backup file on error
Tobias Stoeckmann [Sun, 11 Jan 2026 22:18:48 +0000 (23:18 +0100)] 
lib/commonio.c: Unlink backup file on error

It doesn't make sense to keep a file around if it's not even a proper
backup.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agolib/shadowlog_internal.h: Hide shadow_progname
Tobias Stoeckmann [Sun, 11 Jan 2026 11:34:46 +0000 (12:34 +0100)] 
lib/shadowlog_internal.h: Hide shadow_progname

Accessing and setting shadow_progname is not as straight-forward as it
might seem due to the way of linking libshadow_la with libsubid and
programs.

Enforce the usage of log_get_progname to make this less messy.

With last entry of shadowlog_internal.h gone, remove the file entirely.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agolib/shadowlog_internal.h: Drop shadow_logfd
Tobias Stoeckmann [Sun, 11 Jan 2026 11:28:46 +0000 (12:28 +0100)] 
lib/shadowlog_internal.h: Drop shadow_logfd

Accessing this variable directly is a recipe for disaster, because
binaries and libraries can have different versions in them due to how
libshadow_la linking is performed.

Make sure that at least NULL check is always performed by calling the
proper getter function.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agolibsubid: Avoid shadow_logfd as variable name
Tobias Stoeckmann [Sun, 11 Jan 2026 11:28:02 +0000 (12:28 +0100)] 
libsubid: Avoid shadow_logfd as variable name

A global shadow_logfd variable exists, so this effectively shadows it.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agoRemove unused `logoutd` utility
Iker Pedrosa [Mon, 25 Aug 2025 07:58:51 +0000 (09:58 +0200)] 
Remove unused `logoutd` utility

Link: <https://github.com/shadow-maint/shadow/issues/999>
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
2 months agosrc/: Properly set up libsubid tools
Tobias Stoeckmann [Sun, 11 Jan 2026 11:46:24 +0000 (12:46 +0100)] 
src/: Properly set up libsubid tools

Do not call any shadowlog functions directly from program source files
which are also linked with libsubid.

Both, the program and the library, will have their own version of the
static variables within shadowlog.c and thus would have different
logging mechanisms.

Use subid_init instead.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Use exit instead of _exit in kill_child
Tobias Stoeckmann [Fri, 9 Jan 2026 16:49:39 +0000 (17:49 +0100)] 
su: Use exit instead of _exit in kill_child

Since this is no signal handler anymore, allow regular exit routine to
flush stderr etc.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Mark kill_child with NORETURN
Tobias Stoeckmann [Fri, 9 Jan 2026 16:34:20 +0000 (17:34 +0100)] 
su: Mark kill_child with NORETURN

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Remove dead code
Tobias Stoeckmann [Fri, 9 Jan 2026 16:32:37 +0000 (17:32 +0100)] 
su: Remove dead code

The pid_child is never 0 when reaching kill_child, since kill_child
is called within an if-block which checks explicitly for pid_child not
being 0.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Turn pid_child into local variable
Tobias Stoeckmann [Fri, 9 Jan 2026 16:30:25 +0000 (17:30 +0100)] 
su: Turn pid_child into local variable

The pid_child can be passed into kill_child, since it is no signal
handler anymore.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Drop unneeded char buffers
Tobias Stoeckmann [Fri, 9 Jan 2026 16:28:53 +0000 (17:28 +0100)] 
su: Drop unneeded char buffers

Since kill_child is no signal handler any longer, it is safe to call the
gettext macros directly and only when needed.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Kill child outside of signal handler
Tobias Stoeckmann [Fri, 9 Jan 2026 16:23:38 +0000 (17:23 +0100)] 
su: Kill child outside of signal handler

This simplifies the alarm handler to just set a volatile
sig_atomic_t like catch_signals does, which makes the handler way
easier to review.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Turn caught into volatile sig_atomic_t
Tobias Stoeckmann [Fri, 9 Jan 2026 16:20:07 +0000 (17:20 +0100)] 
su: Turn caught into volatile sig_atomic_t

Only these shared variables can be safely written to by signal handlers.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 months agosu: Fix typos in comment
Tobias Stoeckmann [Fri, 9 Jan 2026 16:19:57 +0000 (17:19 +0100)] 
su: Fix typos in comment

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Reviewed-by: Ruihan Li <lrh2000@pku.edu.cn>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>