Am 09.02.23 um 16:36 schrieb Petr Štetiar:
Server can crash on systems using musl libc when client with comma in
commonName tries to connect:

  ifconfig_pool_read(), in='VPN Client, abc,192.168.1.2,'
  RESOLVE: Cannot parse IP address:  abc: (Name does not resolve)

as this leads to NULL pointer dereference in freeaddrinfo():

  Program received signal SIGSEGV, Segmentation fault.
  0x00007ffff7fbf81a in freeaddrinfo (p=0x0) at src/network/freeaddrinfo.c:10
  (gdb) bt
  #0  0x00007ffff7fbf81a in freeaddrinfo (p=0x0) at 
src/network/freeaddrinfo.c:10
  #1  0x00000000004389ec in get_addr_generic (af=af@entry=2, flags=flags@entry=4, 
hostname=hostname@entry=0x7ffff7ee2988 " abc", 
network=network@entry=0x7fffffffcb7c, netbits=netbits@entry=0x0,
      resolve_retry_seconds=resolve_retry_seconds@entry=0, signal_received=0x0, 
msglevel=64) at openvpn-2.5.7/src/openvpn/socket.c:186
  #2  0x0000000000438a2d in getaddr (flags=flags@entry=4, 
hostname=hostname@entry=0x7ffff7ee2988 " abc", 
resolve_retry_seconds=resolve_retry_seconds@entry=0, 
succeeded=succeeded@entry=0x7fffffffcba7,
      signal_received=signal_received@entry=0x0) at 
openvpn-2.5.7/src/openvpn/socket.c:202
  #3  0x0000000000430ae5 in ifconfig_pool_read (persist=0x7ffff7ee4510, 
pool=0x7ffff7edd450) at openvpn-2.5.7/src/openvpn/pool.c:661

So fix it by checking if `struct addrinfo*` pointer is valid before
passing it down to freeaddrinfo().

I am bit surprised that freeadrinfo does not follow the usual semantics of calling freesomething on a nullptr is a noop.

If this is really the case would should add similar code (with comments that freeaddrinfo is special here) also in gc_freeaddrinfo_callback and the other places that call it without checking for ai to be valid.

Arne



_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to