Clear plaintext passwords in more error cases #1190
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Most code paths make sure that a plaintext password, if not read from stdin or a file, is properly cleared.
This is not true for all
pw_encrypt
error cases. If the salt itself is considered "unknown", thenexit
is called. Letpw_encrypt
return an error code so the program logic can clear passwords properly before handling the error.One such example is musl. If passwd compiled for musl tries to encrypt a password with SHA512 which is longer than 256 characters, it fails. But this can be easily the valid password on the system, because glibc has no such problem. So, just wipe it.
Example output with this patch (passwd linked with musl):
While at it, fixed missing clearing in gpasswd and adjusted a preprocessor definition usage.