This goes again 0.7 branch and should fix segfaults due to invalid connection types (although it won't fix the invalid type itself). See https://bugzilla.redhat.com/show_bug.cgi?id=475864 regards christoph
Index: src/nm-openvpn-service.c
===================================================================
--- src/nm-openvpn-service.c (Revision 14)
+++ src/nm-openvpn-service.c (Arbeitskopie)
@@ -874,7 +874,17 @@
user_name = nm_setting_vpn_get_user_name (s_vpn);
tmp = nm_setting_vpn_get_data_item (s_vpn, NM_OPENVPN_KEY_CONNECTION_TYPE);
+
connection_type = validate_connection_type (tmp);
+
+ if (!connection_type) {
+ g_set_error (error,
+ NM_VPN_PLUGIN_ERROR,
+ NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
+ "%s",
+ "Invalid connection type.");
+ return FALSE;
+ }
/* Need a username for any password-based connection types */
if ( !strcmp (connection_type, NM_OPENVPN_CONTYPE_PASSWORD_TLS)
@@ -932,6 +942,15 @@
tmp = nm_setting_vpn_get_data_item (s_vpn, NM_OPENVPN_KEY_CONNECTION_TYPE);
connection_type = validate_connection_type (tmp);
+
+ if (!connection_type) {
+ g_set_error (error,
+ NM_VPN_PLUGIN_ERROR,
+ NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
+ "%s",
+ "Invalid connection type.");
+ return FALSE;
+ }
if (!strcmp (connection_type, NM_OPENVPN_CONTYPE_PASSWORD_TLS)) {
/* Will require a password and maybe private key password */
Attachment:
signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil