CVE-2020-25717: s3-auth: fix MIT Realm regression
authorRalph Boehme <slow@samba.org>
Fri, 26 Nov 2021 09:57:17 +0000 (10:57 +0100)
committerStefan Metzmacher <metze@samba.org>
Wed, 8 Dec 2021 16:01:10 +0000 (16:01 +0000)
This looks like a regression introduced by the recent security fixes. This
commit should hopefully fixes it.

As a quick solution it might be possible to use the username map script based on
the example in https://bugzilla.samba.org/show_bug.cgi?id=14901#c0. We're not
sure this behaves identical, but it might work in the standalone server case.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=14922

Reported-at: https://lists.samba.org/archive/samba/2021-November/238720.html

Pair-Programmed-With: Stefan Metzmacher <metze@samba.org>

Signed-off-by: Ralph Boehme <slow@samba.org>
Signed-off-by: Stefan Metzmacher <metze@samba.org>
(cherry picked from commit 1e61de8306604a0d3858342df8a1d2412d8d418b)

source3/auth/user_krb5.c

index b8f37cbeee05e3c4b0661c264d780f6afa116257..169bf563368f61ae97f3bdf5e5a6d1a4a5e69254 100644 (file)
@@ -46,6 +46,7 @@ NTSTATUS get_user_from_kerberos_info(TALLOC_CTX *mem_ctx,
        char *fuser = NULL;
        char *unixuser = NULL;
        struct passwd *pw = NULL;
+       bool may_retry = false;
 
        DEBUG(3, ("Kerberos ticket principal name is [%s]\n", princ_name));
 
@@ -71,6 +72,7 @@ NTSTATUS get_user_from_kerberos_info(TALLOC_CTX *mem_ctx,
                domain = realm;
        } else {
                domain = lp_workgroup();
+               may_retry = true;
        }
 
        fuser = talloc_asprintf(mem_ctx,
@@ -89,6 +91,13 @@ NTSTATUS get_user_from_kerberos_info(TALLOC_CTX *mem_ctx,
        *mapped_to_guest = false;
 
        pw = smb_getpwnam(mem_ctx, fuser, &unixuser, true);
+       if (may_retry && pw == NULL && !*is_mapped) {
+               fuser = talloc_strdup(mem_ctx, user);
+               if (!fuser) {
+                       return NT_STATUS_NO_MEMORY;
+               }
+               pw = smb_getpwnam(mem_ctx, fuser, &unixuser, true);
+       }
        if (pw) {
                if (!unixuser) {
                        return NT_STATUS_NO_MEMORY;