* [PATCH] decnet: incorrect optlen size
@ 2009-01-29 8:21 Roel Kluin
2009-01-29 8:58 ` steve
0 siblings, 1 reply; 3+ messages in thread
From: Roel Kluin @ 2009-01-29 8:21 UTC (permalink / raw)
To: christine.caulfield; +Cc: linux-decnet-user, netdev
Several functions with something like this occur:
int sock_set_foo(int optlen, ...)
{
struct food foo;
if (optlen < sizeof(foo))
return -EINVAL;
if (copy_from_user(&foo, optval, sizeof(foo)))
return -EFAULT;
...
}
see for instance:
grep -C5 -E -R -n "copy_from_user\(&([a-zA-Z0-9]*), optval, sizeof\(\1\)\)" net
but in __dn_setsockopt, below, the checks are slightly different.
Should maybe the changes below be apllied?
-------------->8----------------8<-----------------------
fix size checks before copy_from_user
Signed-off-by: Roel Kluin <roel.kluin@gmail.com>
---
diff --git a/net/decnet/af_decnet.c b/net/decnet/af_decnet.c
index cf0e184..45b9199 100644
--- a/net/decnet/af_decnet.c
+++ b/net/decnet/af_decnet.c
@@ -1359,10 +1359,10 @@ static int __dn_setsockopt(struct socket *sock, int level,int optname, char __us
if (optlen && !optval)
return -EINVAL;
- if (optlen > sizeof(u))
+ if (optlen < sizeof(u))
return -EINVAL;
- if (copy_from_user(&u, optval, optlen))
+ if (copy_from_user(&u, optval, sizeof(u)))
return -EFAULT;
switch(optname) {
^ permalink raw reply related [flat|nested] 3+ messages in thread* Re: [PATCH] decnet: incorrect optlen size
2009-01-29 8:21 [PATCH] decnet: incorrect optlen size Roel Kluin
@ 2009-01-29 8:58 ` steve
2009-01-30 1:15 ` David Miller
0 siblings, 1 reply; 3+ messages in thread
From: steve @ 2009-01-29 8:58 UTC (permalink / raw)
To: Roel Kluin; +Cc: christine.caulfield, linux-decnet-user, netdev
Hi,
On Thu, Jan 29, 2009 at 09:21:15AM +0100, Roel Kluin wrote:
> Several functions with something like this occur:
>
> int sock_set_foo(int optlen, ...)
> {
> struct food foo;
>
> if (optlen < sizeof(foo))
> return -EINVAL;
>
> if (copy_from_user(&foo, optval, sizeof(foo)))
> return -EFAULT;
> ...
> }
>
> see for instance:
> grep -C5 -E -R -n "copy_from_user\(&([a-zA-Z0-9]*), optval, sizeof\(\1\)\)" net
>
> but in __dn_setsockopt, below, the checks are slightly different.
> Should maybe the changes below be apllied?
>
> -------------->8----------------8<-----------------------
> fix size checks before copy_from_user
>
> Signed-off-by: Roel Kluin <roel.kluin@gmail.com>
> ---
> diff --git a/net/decnet/af_decnet.c b/net/decnet/af_decnet.c
> index cf0e184..45b9199 100644
> --- a/net/decnet/af_decnet.c
> +++ b/net/decnet/af_decnet.c
> @@ -1359,10 +1359,10 @@ static int __dn_setsockopt(struct socket *sock, int level,int optname, char __us
> if (optlen && !optval)
> return -EINVAL;
>
> - if (optlen > sizeof(u))
> + if (optlen < sizeof(u))
> return -EINVAL;
>
I don't see that this makes sense... we want to ensure that the passed
length is less than the size of the union which we are going to use
as a buffer.
> - if (copy_from_user(&u, optval, optlen))
> + if (copy_from_user(&u, optval, sizeof(u)))
> return -EFAULT;
>
... and here we only want to copy the amount of data that has actually
been supplied, not the whole buffer size since in many cases the
amount of data is less than the total buffer size.
The only sensible addition that I can see, would be to zero out the
buffer before the copy to ensure that we don't land up using data
from the stack in the case that the supplied data is less than that
required for a particular command.
Steve.
^ permalink raw reply [flat|nested] 3+ messages in thread* Re: [PATCH] decnet: incorrect optlen size
2009-01-29 8:58 ` steve
@ 2009-01-30 1:15 ` David Miller
0 siblings, 0 replies; 3+ messages in thread
From: David Miller @ 2009-01-30 1:15 UTC (permalink / raw)
To: steve; +Cc: roel.kluin, christine.caulfield, linux-decnet-user, netdev
From: steve@chygwyn.com
Date: Thu, 29 Jan 2009 08:58:58 +0000
> On Thu, Jan 29, 2009 at 09:21:15AM +0100, Roel Kluin wrote:
> > @@ -1359,10 +1359,10 @@ static int __dn_setsockopt(struct socket *sock, int level,int optname, char __us
> > if (optlen && !optval)
> > return -EINVAL;
> >
> > - if (optlen > sizeof(u))
> > + if (optlen < sizeof(u))
> > return -EINVAL;
> >
> I don't see that this makes sense... we want to ensure that the passed
> length is less than the size of the union which we are going to use
> as a buffer.
>
> > - if (copy_from_user(&u, optval, optlen))
> > + if (copy_from_user(&u, optval, sizeof(u)))
> > return -EFAULT;
> >
> ... and here we only want to copy the amount of data that has actually
> been supplied, not the whole buffer size since in many cases the
> amount of data is less than the total buffer size.
This code is fine as-is, every single case statement below
this code makes an explicit optlen equality check before
deferencing any member of the union object we copy into.
I'm therefore dropping this patch.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2009-01-30 1:15 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-01-29 8:21 [PATCH] decnet: incorrect optlen size Roel Kluin
2009-01-29 8:58 ` steve
2009-01-30 1:15 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).