]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
ask-password: prevent buffer overrow when reading from keyring
authorThadeu Lima de Souza Cascardo <cascardo@canonical.com>
Mon, 13 May 2019 19:58:01 +0000 (16:58 -0300)
committerLennart Poettering <lennart@poettering.net>
Wed, 15 May 2019 08:49:46 +0000 (10:49 +0200)
When we read from keyring, a temporary buffer is allocated in order to
determine the size needed for the entire data. However, when zeroing that area,
we use the data size returned by the read instead of the lesser size allocate
for the buffer.

That will cause memory corruption that causes systemd-cryptsetup to crash
either when a single large password is used or when multiple passwords have
already been pushed to the keyring.

Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
src/shared/ask-password-api.c

index ab0c34692f1ce22b34157e16762f189a18595002..6c0a36990291832e7c2c36953515c5ecb91448c2 100644 (file)
@@ -80,7 +80,7 @@ static int retrieve_key(key_serial_t serial, char ***ret) {
                 if (n < m)
                         break;
 
-                explicit_bzero_safe(p, n);
+                explicit_bzero_safe(p, m);
 
                 if (m > LONG_MAX / 2) /* overflow check */
                         return -ENOMEM;