overly long user/group names are potentially a DoS vector and source
of other problems like partial writes by sendmsg, and not useful.
#include <stdio.h>
#include <string.h>
#include <errno.h>
+#include <limits.h>
#include "nscd.h"
static const struct {
int32_t req_buf[REQ_LEN] = {
NSCDVERSION,
req,
- strlen(key)+1
+ strnlen(key,LOGIN_NAME_MAX)+1
};
struct msghdr msg = {
.msg_iov = (struct iovec[]){
return 0;
}
- if (strlen(key) > INT32_MAX - 1)
+ if (req_buf[2] > LOGIN_NAME_MAX)
return f;
if (connect(fd, (struct sockaddr*)&addr, sizeof(addr)) < 0) {