summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThadeu Lima de Souza Cascardo <cascardo@canonical.com>2019-05-13 16:58:01 -0300
committerThe Plumber <50238977+systemd-rhel-bot@users.noreply.github.com>2019-11-29 12:35:35 +0100
commit7200c0b173bec49c63ac5ecdf6d510d26e8c8271 (patch)
tree2f3ff82b8132f3de283aaf9071c6824194c5711a
parent7c9077683df0c3959b1bcae973a05e114b15a600 (diff)
downloadsystemd-239-18.2.tar.gz
ask-password: prevent buffer overrow when reading from keyringv239-18.2
When we read from keyring, a temporary buffer is allocated in order to determine the size needed for the entire data. However, when zeroing that area, we use the data size returned by the read instead of the lesser size allocate for the buffer. That will cause memory corruption that causes systemd-cryptsetup to crash either when a single large password is used or when multiple passwords have already been pushed to the keyring. Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> (cherry picked from commit 59c55e73eaee345e1ee67c23eace8895ed499693) (cherry picked from commit c6c8e0d097d6ba12471c6112c3fd339ea40329d5) Resolves: #1777037
-rw-r--r--src/shared/ask-password-api.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/shared/ask-password-api.c b/src/shared/ask-password-api.c
index 682dc754fc..764ebd08e1 100644
--- a/src/shared/ask-password-api.c
+++ b/src/shared/ask-password-api.c
@@ -79,7 +79,7 @@ static int retrieve_key(key_serial_t serial, char ***ret) {
if (n < m)
break;
- explicit_bzero(p, n);
+ explicit_bzero(p, m);
free(p);
m *= 2;
}