summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDylan Noblesmith <nobled@dreamwidth.org>2012-06-15 21:32:19 +0000
committerDylan Noblesmith <nobled@dreamwidth.org>2012-06-30 19:58:05 +0000
commit00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf (patch)
treef8815d6f8e475271804ca4b14af866132ed38e5c
parentwayland-server: add more logging of errors (diff)
downloadwayland-00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf.tar
wayland-00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf.tar.gz
wayland-00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf.tar.bz2
wayland-00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf.tar.lz
wayland-00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf.tar.xz
wayland-00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf.tar.zst
wayland-00c25a05656b0bbc3da56383ca2aa9be7f6ebdbf.zip
wayland-server: reject socket paths longer than 108 bytes
Attempting to write anything longer into the embedded char array would create a non-null-terminated string, and all later reads would run off the end into invalid memory. This is a hard limitation of AF_LOCAL/AF_UNIX sockets.
-rw-r--r--src/wayland-server.c16
1 files changed, 15 insertions, 1 deletions
diff --git a/src/wayland-server.c b/src/wayland-server.c
index 8b24a71..d141682 100644
--- a/src/wayland-server.c
+++ b/src/wayland-server.c
@@ -1153,7 +1153,8 @@ WL_EXPORT int
wl_display_add_socket(struct wl_display *display, const char *name)
{
struct wl_socket *s;
- socklen_t size, name_size;
+ socklen_t size;
+ int name_size;
const char *runtime_dir;
runtime_dir = getenv("XDG_RUNTIME_DIR");
@@ -1185,6 +1186,19 @@ wl_display_add_socket(struct wl_display *display, const char *name)
s->addr.sun_family = AF_LOCAL;
name_size = snprintf(s->addr.sun_path, sizeof s->addr.sun_path,
"%s/%s", runtime_dir, name) + 1;
+
+ assert(name_size > 0);
+ if (name_size > (int)sizeof s->addr.sun_path) {
+ wl_log("error: socket path \"%s/%s\" plus null terminator"
+ " exceeds 108 bytes\n", runtime_dir, name);
+ close(s->fd);
+ free(s);
+ /* to prevent programs reporting
+ * "failed to add socket: Success" */
+ errno = ENAMETOOLONG;
+ return -1;
+ };
+
wl_log("using socket %s\n", s->addr.sun_path);
s->fd_lock = get_socket_lock(s);