mirror of
https://github.com/OpenVPN/openvpn.git
synced 2026-04-29 01:50:03 -04:00
Ensure option array p[] is always NULL-terminated
Add one element (a terminating NULL pointer) to the array into which parse_line() stores the arguments. This prevents that options that traverse this array until a terminator is seen (for instance options that call no_more_than_n_args) will peek beyond buffer bounds. In the worst case this might lead to a crash (stack overflow, not likely in practice). Signed-off-by: Guido Vranken <guidovranken@gmail.com> Acked-by: Gert Doering <gert@greenie.muc.de> Message-Id: <CAO5O-EKCLjPpdKUH6cCoqoZDAfekSafpc7Ga55H2_5Hs4rBopg@mail.gmail.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg14757.html Signed-off-by: Gert Doering <gert@greenie.muc.de>
This commit is contained in:
parent
2dca268a64
commit
8b03d3d930
1 changed files with 6 additions and 6 deletions
|
|
@ -4531,7 +4531,7 @@ read_config_file(struct options *options,
|
|||
FILE *fp;
|
||||
int line_num;
|
||||
char line[OPTION_LINE_SIZE+1];
|
||||
char *p[MAX_PARMS];
|
||||
char *p[MAX_PARMS+1];
|
||||
|
||||
++level;
|
||||
if (level <= max_recursive_levels)
|
||||
|
|
@ -4563,7 +4563,7 @@ read_config_file(struct options *options,
|
|||
{
|
||||
offset = 3;
|
||||
}
|
||||
if (parse_line(line + offset, p, SIZE(p), file, line_num, msglevel, &options->gc))
|
||||
if (parse_line(line + offset, p, SIZE(p)-1, file, line_num, msglevel, &options->gc))
|
||||
{
|
||||
bypass_doubledash(&p[0]);
|
||||
check_inline_file_via_fp(fp, p, &options->gc);
|
||||
|
|
@ -4605,10 +4605,10 @@ read_config_string(const char *prefix,
|
|||
|
||||
while (buf_parse(&multiline, '\n', line, sizeof(line)))
|
||||
{
|
||||
char *p[MAX_PARMS];
|
||||
char *p[MAX_PARMS+1];
|
||||
CLEAR(p);
|
||||
++line_num;
|
||||
if (parse_line(line, p, SIZE(p), prefix, line_num, msglevel, &options->gc))
|
||||
if (parse_line(line, p, SIZE(p)-1, prefix, line_num, msglevel, &options->gc))
|
||||
{
|
||||
bypass_doubledash(&p[0]);
|
||||
check_inline_file_via_buf(&multiline, p, &options->gc);
|
||||
|
|
@ -4739,14 +4739,14 @@ apply_push_options(struct options *options,
|
|||
|
||||
while (buf_parse(buf, ',', line, sizeof(line)))
|
||||
{
|
||||
char *p[MAX_PARMS];
|
||||
char *p[MAX_PARMS+1];
|
||||
CLEAR(p);
|
||||
++line_num;
|
||||
if (!apply_pull_filter(options, line))
|
||||
{
|
||||
return false; /* Cause push/pull error and stop push processing */
|
||||
}
|
||||
if (parse_line(line, p, SIZE(p), file, line_num, msglevel, &options->gc))
|
||||
if (parse_line(line, p, SIZE(p)-1, file, line_num, msglevel, &options->gc))
|
||||
{
|
||||
add_option(options, p, file, line_num, 0, msglevel, permission_mask, option_types_found, es);
|
||||
}
|
||||
|
|
|
|||
Loading…
Reference in a new issue