public inbox for kernel-janitors@vger.kernel.org
 help / color / mirror / Atom feed
From: Takashi Iwai <tiwai@suse.de>
To: Dan Carpenter <dan.carpenter@oracle.com>
Cc: Vinod Koul <vinod.koul@linux.intel.com>,
	alsa-devel@alsa-project.org, kernel-janitors@vger.kernel.org,
	Pierre-Louis Bossart <pierre-louis.bossart@linux.intel.com>,
	Jesper Juhl <jj@chaosbits.net>,
	Namarta Kohli <namartax.kohli@intel.com>
Subject: Re: [patch] ALSA: compress_core: integer overflow in snd_compr_allocate_buffer()
Date: Thu, 06 Sep 2012 15:19:07 +0000	[thread overview]
Message-ID: <s5h627rxjpw.wl%tiwai@suse.de> (raw)
In-Reply-To: <20120906145912.GK19410@mwanda>

At Thu, 6 Sep 2012 07:59:13 -0700,
Dan Carpenter wrote:
> 
> On Wed, Sep 05, 2012 at 03:40:06PM +0200, Takashi Iwai wrote:
> > At Wed, 5 Sep 2012 15:32:18 +0300,
> > Dan Carpenter wrote:
> > > 
> > > These are 32 bit values that come from the user, we need to check for
> > > integer overflows or we could end up allocating a smaller buffer than
> > > expected.
> > 
> > The buffer size here is supposed to be fairly small that kmalloc can
> > handle.  So, the overflow check is good, but in practice it'd return
> > -ENOMEM.
> 
> My concern was the security implications from an integer wrap.  If
> we chose ->fragment_size = 256 and ->fragments = 0x80000001 then the
> size of the final buffer would only be 256 bytes.  The allocation
> would succeed and it might lead to memory corruption later on.  I
> haven't followed it through to verify but adding a sanity check is a
> good idea.  It should probably be pushed to -stable as well.

Yeah, a fix is really needed.  But, note that this API hasn't been
used by any driver yet in the released upstream kernels, so the impact
to the real world is pretty close to null.  Thus I don't know whether
it's worth for stable kernel, too.

(The real driver implementation appears first in 3.7 kernel, BTW.)

> > Of course, it's fine to put the sanity check, but such
> > checks could be better peformed in snd_compr_set_params() before
> > calling the allocation, I think.
> 
> To me it looks sort of weird to do the checking there.  Also if we
> add more callers we would have to add the checking to all the
> callers as well.  I can do that if you still prefer.

Well, there are two issues here: the integer overflow of buffer size
and the invalid parameters.  I agree that checking the integer
overflow can be there as well in a safer side.  OTOH, the check of
invalid parameters should be added definitely.  There might be more
other places do behave more badly by such parameters even if the
values don't exceed the integer max.

So, we actually should have two distinct fixes.


thanks,

Takashi


> 
> regards,
> dan carpenter
> 
> > 
> > 
> > thanks,
> > 
> > Takashi
> > 
> > > 
> > > Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > 
> > > diff --git a/sound/core/compress_offload.c b/sound/core/compress_offload.c
> > > index ec2118d..5a733e7 100644
> > > --- a/sound/core/compress_offload.c
> > > +++ b/sound/core/compress_offload.c
> > > @@ -409,6 +409,10 @@ static int snd_compr_allocate_buffer(struct snd_compr_stream *stream,
> > >  	unsigned int buffer_size;
> > >  	void *buffer;
> > >  
> > > +	if (params->buffer.fragment_size = 0 ||
> > > +	    params->buffer.fragments > SIZE_MAX / params->buffer.fragment_size)
> > > +		return -EINVAL;
> > > +
> > >  	buffer_size = params->buffer.fragment_size * params->buffer.fragments;
> > >  	if (stream->ops->copy) {
> > >  		buffer = NULL;
> > > 
> 

  reply	other threads:[~2012-09-06 15:19 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-09-05 12:32 [patch] ALSA: compress_core: integer overflow in snd_compr_allocate_buffer() Dan Carpenter
2012-09-05 13:40 ` Takashi Iwai
2012-09-06 14:59   ` Dan Carpenter
2012-09-06 15:19     ` Takashi Iwai [this message]
2012-09-14  9:06       ` Takashi Iwai
2012-09-14  9:36         ` Vinod Koul
2012-09-14  9:35           ` Dan Carpenter
2012-09-14  9:40           ` Vinod Koul
2012-09-14  9:45             ` Takashi Iwai
2012-09-14  9:52               ` Vinod Koul
2012-09-14 10:00                 ` Takashi Iwai

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=s5h627rxjpw.wl%tiwai@suse.de \
    --to=tiwai@suse.de \
    --cc=alsa-devel@alsa-project.org \
    --cc=dan.carpenter@oracle.com \
    --cc=jj@chaosbits.net \
    --cc=kernel-janitors@vger.kernel.org \
    --cc=namartax.kohli@intel.com \
    --cc=pierre-louis.bossart@linux.intel.com \
    --cc=vinod.koul@linux.intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox