mirror of
https://github.com/systemd/systemd.git
synced 2025-03-09 12:58:26 +03:00
network: fix use-of-uninitialized-value or null dereference
This fixes a bug introduced by 6ef5c881dd5568f08dc35013e24f7d857f36b207. Fixes oss-fuzz#14157 and oss-fuzz#14158.
This commit is contained in:
parent
55a37d7117
commit
86a3d44de5
@ -498,24 +498,18 @@ static int wireguard_decode_key_and_warn(
|
||||
(void) warn_file_is_world_accessible(filename, NULL, unit, line);
|
||||
|
||||
r = unbase64mem_full(rvalue, strlen(rvalue), true, &key, &len);
|
||||
if (r < 0) {
|
||||
log_syntax(unit, LOG_ERR, filename, line, r,
|
||||
if (r < 0)
|
||||
return log_syntax(unit, LOG_ERR, filename, line, r,
|
||||
"Failed to decode wireguard key provided by %s=, ignoring assignment: %m", lvalue);
|
||||
goto finalize;
|
||||
}
|
||||
if (len != WG_KEY_LEN) {
|
||||
log_syntax(unit, LOG_ERR, filename, line, 0,
|
||||
explicit_bzero_safe(key, len);
|
||||
return log_syntax(unit, LOG_ERR, filename, line, 0,
|
||||
"Wireguard key provided by %s= has invalid length (%zu bytes), ignoring assignment.",
|
||||
lvalue, len);
|
||||
goto finalize;
|
||||
}
|
||||
|
||||
memcpy(ret, key, WG_KEY_LEN);
|
||||
r = 0;
|
||||
|
||||
finalize:
|
||||
explicit_bzero_safe(key, len);
|
||||
return r;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int config_parse_wireguard_private_key(
|
||||
|
5
test/fuzz/fuzz-netdev-parser/oss-fuzz-14157
Normal file
5
test/fuzz/fuzz-netdev-parser/oss-fuzz-14157
Normal file
@ -0,0 +1,5 @@
|
||||
[NetDev]
|
||||
Name=w
|
||||
Kind=wireguard
|
||||
[WireGuardPeer]
|
||||
PublicKey=e
|
5
test/fuzz/fuzz-netdev-parser/oss-fuzz-14158
Normal file
5
test/fuzz/fuzz-netdev-parser/oss-fuzz-14158
Normal file
@ -0,0 +1,5 @@
|
||||
[NetDev]
|
||||
Name=w
|
||||
Kind=wireguard
|
||||
[WireGuard]
|
||||
PrivateKey=E
|
Loading…
x
Reference in New Issue
Block a user