Path: blob/main/logsrvd/regress/fuzz/fuzz_logsrvd_conf.c
1532 views
/*1* Copyright (c) 2021-2022 Todd C. Miller <[email protected]>2*3* Permission to use, copy, modify, and distribute this software for any4* purpose with or without fee is hereby granted, provided that the above5* copyright notice and this permission notice appear in all copies.6*7* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES8* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF9* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR10* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES11* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN12* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF13* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.14*/1516#include <config.h>1718#include <sys/types.h>19#include <sys/socket.h>20#include <netinet/in.h>21#include <arpa/inet.h>2223#include <stdio.h>24#include <stdlib.h>25#include <string.h>26#include <fcntl.h>27#include <limits.h>28#include <netdb.h>29#include <regex.h>30#include <time.h>31#include <unistd.h>32#if defined(HAVE_STDINT_H)33# include <stdint.h>34#elif defined(HAVE_INTTYPES_H)35# include <inttypes.h>36#endif3738#include <sudo_compat.h>39#include <sudo_conf.h>40#include <sudo_debug.h>41#include <sudo_eventlog.h>42#include <sudo_fatal.h>43#include <sudo_iolog.h>44#include <sudo_plugin.h>45#include <sudo_util.h>4647#include <logsrvd.h>4849int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);5051/*52* Stub version that always succeeds for small inputs and fails for large.53* We want to fuzz our parser, not libc's regular expression code.54*/55bool56sudo_regex_compile_v1(void *v, const char *pattern, const char **errstr)57{58regex_t *preg = v;5960if (strlen(pattern) > 32) {61*errstr = "invalid regular expression";62return false;63}6465/* hopefully avoid regfree() crashes */66memset(preg, 0, sizeof(*preg));67return true;68}6970/*71* The fuzzing environment may not have DNS available, this may result72* in long delays that cause a timeout when fuzzing.73* This getaddrinfo() resolves every name as "localhost" (127.0.0.1).74*/75#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION76/* Avoid compilation errors if getaddrinfo() or freeaddrinfo() are macros. */77# undef getaddrinfo78# undef freeaddrinfo7980int81# ifdef HAVE_GETADDRINFO82getaddrinfo(83# else84sudo_getaddrinfo(85# endif86const char *nodename, const char *servname,87const struct addrinfo *hints, struct addrinfo **res)88{89struct addrinfo *ai;90struct in_addr addr;91unsigned short port = 0;9293/* Stub getaddrinfo(3) to avoid a DNS timeout in CIfuzz. */94if (servname == NULL) {95/* Must have either nodename or servname. */96if (nodename == NULL)97return EAI_NONAME;98} else {99struct servent *servent;100const char *errstr;101102/* Parse servname as a port number or IPv4 TCP service name. */103port = sudo_strtonum(servname, 0, USHRT_MAX, &errstr);104if (errstr != NULL && errno == ERANGE)105return EAI_SERVICE;106if (hints != NULL && ISSET(hints->ai_flags, AI_NUMERICSERV))107return EAI_NONAME;108servent = getservbyname(servname, "tcp");109if (servent == NULL)110return EAI_NONAME;111port = htons(servent->s_port);112}113114/* Hard-code IPv4 localhost for fuzzing. */115ai = calloc(1, sizeof(*ai) + sizeof(struct sockaddr_in));116if (ai == NULL)117return EAI_MEMORY;118ai->ai_canonname = strdup("localhost");119if (ai == NULL) {120free(ai);121return EAI_MEMORY;122}123ai->ai_family = AF_INET;124ai->ai_protocol = IPPROTO_TCP;125ai->ai_addrlen = sizeof(struct sockaddr_in);126ai->ai_addr = (struct sockaddr *)(ai + 1);127inet_pton(AF_INET, "127.0.0.1", &addr);128((struct sockaddr_in *)ai->ai_addr)->sin_family = AF_INET;129((struct sockaddr_in *)ai->ai_addr)->sin_addr = addr;130((struct sockaddr_in *)ai->ai_addr)->sin_port = htons(port);131*res = ai;132return 0;133}134135void136# ifdef HAVE_GETADDRINFO137freeaddrinfo(struct addrinfo *ai)138# else139sudo_freeaddrinfo(struct addrinfo *ai)140# endif141{142struct addrinfo *next;143144while (ai != NULL) {145next = ai->ai_next;146free(ai->ai_canonname);147free(ai);148ai = next;149}150}151#endif /* FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION */152153static int154fuzz_conversation(int num_msgs, const struct sudo_conv_message msgs[],155struct sudo_conv_reply replies[], struct sudo_conv_callback *callback)156{157int n;158159for (n = 0; n < num_msgs; n++) {160const struct sudo_conv_message *msg = &msgs[n];161162switch (msg->msg_type & 0xff) {163case SUDO_CONV_PROMPT_ECHO_ON:164case SUDO_CONV_PROMPT_MASK:165case SUDO_CONV_PROMPT_ECHO_OFF:166/* input not supported */167return -1;168case SUDO_CONV_ERROR_MSG:169case SUDO_CONV_INFO_MSG:170/* no output for fuzzers */171break;172default:173return -1;174}175}176return 0;177}178179int180LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)181{182char tempfile[] = "/tmp/logsrvd_conf.XXXXXX";183ssize_t nwritten;184int fd;185186initprogname("fuzz_logsrvd_conf");187if (getenv("SUDO_FUZZ_VERBOSE") == NULL)188sudo_warn_set_conversation(fuzz_conversation);189190/* logsrvd_conf_read() uses a conf file path, not an open file. */191fd = mkstemp(tempfile);192if (fd == -1)193return 0;194nwritten = write(fd, data, size);195if ((size_t)nwritten != size) {196close(fd);197return 0;198}199close(fd);200201if (logsrvd_conf_read(tempfile)) {202/* public config getters */203logsrvd_conf_iolog_dir();204logsrvd_conf_iolog_file();205logsrvd_conf_iolog_mode();206logsrvd_conf_pid_file();207logsrvd_conf_relay_address();208logsrvd_conf_relay_connect_timeout();209logsrvd_conf_relay_tcp_keepalive();210logsrvd_conf_relay_timeout();211logsrvd_conf_server_listen_address();212logsrvd_conf_server_tcp_keepalive();213logsrvd_conf_server_timeout();214215/* free config */216logsrvd_conf_cleanup();217}218219unlink(tempfile);220221fflush(stdout);222223return 0;224}225226227