Skip to content

nm: fix filename overflow for WiFi SSIDs with multi-byte characters#580

Open
rone-oliver wants to merge 3 commits intocanonical:mainfrom
rone-oliver:fix/nm-ssid-filename-name-max-overflow
Open

nm: fix filename overflow for WiFi SSIDs with multi-byte characters#580
rone-oliver wants to merge 3 commits intocanonical:mainfrom
rone-oliver:fix/nm-ssid-filename-name-max-overflow

Conversation

@rone-oliver
Copy link
Copy Markdown

Description

SSIDs containing multi-byte UTF-8 characters (e.g. emojis) are stored
by NetworkManager in a semicolon-delimited decimal-byte format
(e.g. 240;159;154;128). When g_uri_escape_string() percent-encodes
this string, each semicolon becomes %3B, expanding a 20-emoji SSID
from ~160 bytes to ~507 bytes — well beyond the 255-byte NAME_MAX
limit. NetworkManager then crashes with "File name too long".

Fix: In netplan_netdef_get_output_filename() and in
write_nm_conf_access_point(), check the candidate basename length
against NAME_MAX before writing. If it would overflow, replace the
percent-encoded SSID with its SHA-256 hex digest (always 64 chars →
91-byte basename). The reverse lookup in
netplan_get_id_from_nm_filepath() is updated to fall back to the
hashed suffix when the escaped form isn't found.

Two new ctests cover the normal path and the long-SSID hashing path.

Fixes LP: #2147259

Checklist

  • Runs make check successfully.
  • Retains code coverage (make check-coverage).
  • New/changed keys in YAML format are documented. (N/A — no new YAML keys)
  • (Optional) Closes an open bug in Launchpad. LP: #2147259

SSIDs containing multi-byte UTF-8 characters (e.g. emojis) are
percent-encoded by g_uri_escape_string(), expanding each byte to 3
characters. This causes the .nmconnection filename basename to exceed
NAME_MAX (255 bytes), crashing NetworkManager with "File name too long".

If the candidate basename exceeds NAME_MAX, replace the percent-encoded
SSID with a SHA-256 hex digest of the raw SSID bytes. This guarantees a
valid-length (91-byte), unique filename regardless of SSID content.

Apply the same fix in netplan_get_id_from_nm_filepath() so the reverse
lookup falls back to the hashed suffix when the escaped form is absent.

Fixes: LP: #2147259
@rone-oliver rone-oliver marked this pull request as draft April 12, 2026 10:54
Add test_write_wifi_long_ssid_uses_hash() to test_netplan_nm.c to
exercise the NAME_MAX overflow path in write_nm_conf_access_point().

A 20-emoji SSID in NM decimal-byte format (320 chars with semicolons)
produces a 507-byte candidate basename when percent-encoded, exceeding
NAME_MAX (255). The test verifies that _netplan_netdef_write_nm()
falls back to a SHA-256 digest filename and that the basename is
within NAME_MAX.

Closes the coverage gap introduced by LP: #2147259 fix.
The 'long_ssid' ctests used raw UTF-8 emoji bytes, but
g_uri_escape_string() with allow_utf8=TRUE passes valid UTF-8
sequences through unescaped (80 bytes → 107-byte basename, well
under NAME_MAX). Those tests never triggered the SHA-256 hash
fallback, leaving lines 649-651 and 690-691 of util.c uncovered.

Change the SSID in both tests to the NM decimal-byte format
("240;159;152;128;" × 20). Semicolons encode to '%3B', yielding a
480-char escaped SSID and a 507-byte candidate basename > NAME_MAX,
which correctly exercises the hash path.

Also add the expected-hash assertion to
test_netplan_netdef_get_output_filename_nm_with_long_ssid to verify
the SHA-256 digest (not the escaped form) appears in the filename.

Fix a missing LCOV_EXCL_LINE on the chown() failure branch in
_netplan_g_string_free_to_file_with_permissions (consistent with the
surrounding getpwnam/getgrnam failure lines already marked).
@rone-oliver
Copy link
Copy Markdown
Author

CI notes for reviewers:

Coverage (Unit tests & Coverage): The overall C coverage shows ~96%, but this is a pre-existing baseline on main before this PR (the large gap is in gen-openvswitch.c, parse.c, etc., which are unrelated to this fix). The two files this PR touches — src/nm.c and src/util.c — are both at 100% coverage after the test commits.

Autopkgtest / RPM build / Spread failures: These three checks are failing with the same errors on other recent merged PRs (infra/environment issues, not code regressions). They are not caused by this patch.

@rone-oliver rone-oliver marked this pull request as ready for review April 12, 2026 15:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant