* [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences
@ 2017-08-24 9:46 Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 1/4] ifstat, nstat: Check fdopen() return value Phil Sutter
` (4 more replies)
0 siblings, 5 replies; 6+ messages in thread
From: Phil Sutter @ 2017-08-24 9:46 UTC (permalink / raw)
To: Stephen Hemminger; +Cc: netdev
This series collects patches from v1 which eliminate possible cases of
NULL pointer dereferences.
Changes since v3:
- Dropped upstream rejected patch 2.
Phil Sutter (4):
ifstat, nstat: Check fdopen() return value
tc/q_netem: Don't dereference possibly NULL pointer
tc/tc_filter: Make sure filter name is not empty
tipc/bearer: Prevent NULL pointer dereference
misc/ifstat.c | 16 +++++++++++-----
misc/nstat.c | 16 +++++++++++-----
tc/q_netem.c | 3 ++-
tc/tc_filter.c | 3 +++
tipc/bearer.c | 2 +-
5 files changed, 28 insertions(+), 12 deletions(-)
--
2.13.1
^ permalink raw reply [flat|nested] 6+ messages in thread
* [iproute PATCH v4 1/4] ifstat, nstat: Check fdopen() return value
2017-08-24 9:46 [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Phil Sutter
@ 2017-08-24 9:46 ` Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 2/4] tc/q_netem: Don't dereference possibly NULL pointer Phil Sutter
` (3 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: Phil Sutter @ 2017-08-24 9:46 UTC (permalink / raw)
To: Stephen Hemminger; +Cc: netdev
Prevent passing NULL FILE pointer to fgets() later.
Fix both tools in a single patch since the code changes are basically
identical.
Signed-off-by: Phil Sutter <phil@nwl.cc>
---
misc/ifstat.c | 16 +++++++++++-----
misc/nstat.c | 16 +++++++++++-----
2 files changed, 22 insertions(+), 10 deletions(-)
diff --git a/misc/ifstat.c b/misc/ifstat.c
index 1be21703bf14c..ac3eff6b870a9 100644
--- a/misc/ifstat.c
+++ b/misc/ifstat.c
@@ -992,12 +992,18 @@ int main(int argc, char *argv[])
&& verify_forging(fd) == 0) {
FILE *sfp = fdopen(fd, "r");
- load_raw_table(sfp);
- if (hist_db && source_mismatch) {
- fprintf(stderr, "ifstat: history is stale, ignoring it.\n");
- hist_db = NULL;
+ if (!sfp) {
+ fprintf(stderr, "ifstat: fdopen failed: %s\n",
+ strerror(errno));
+ close(fd);
+ } else {
+ load_raw_table(sfp);
+ if (hist_db && source_mismatch) {
+ fprintf(stderr, "ifstat: history is stale, ignoring it.\n");
+ hist_db = NULL;
+ }
+ fclose(sfp);
}
- fclose(sfp);
} else {
if (fd >= 0)
close(fd);
diff --git a/misc/nstat.c b/misc/nstat.c
index 1212b1f2c8128..a4dd405d43a93 100644
--- a/misc/nstat.c
+++ b/misc/nstat.c
@@ -706,12 +706,18 @@ int main(int argc, char *argv[])
&& verify_forging(fd) == 0) {
FILE *sfp = fdopen(fd, "r");
- load_good_table(sfp);
- if (hist_db && source_mismatch) {
- fprintf(stderr, "nstat: history is stale, ignoring it.\n");
- hist_db = NULL;
+ if (!sfp) {
+ fprintf(stderr, "nstat: fdopen failed: %s\n",
+ strerror(errno));
+ close(fd);
+ } else {
+ load_good_table(sfp);
+ if (hist_db && source_mismatch) {
+ fprintf(stderr, "nstat: history is stale, ignoring it.\n");
+ hist_db = NULL;
+ }
+ fclose(sfp);
}
- fclose(sfp);
} else {
if (fd >= 0)
close(fd);
--
2.13.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [iproute PATCH v4 2/4] tc/q_netem: Don't dereference possibly NULL pointer
2017-08-24 9:46 [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 1/4] ifstat, nstat: Check fdopen() return value Phil Sutter
@ 2017-08-24 9:46 ` Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 3/4] tc/tc_filter: Make sure filter name is not empty Phil Sutter
` (2 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: Phil Sutter @ 2017-08-24 9:46 UTC (permalink / raw)
To: Stephen Hemminger; +Cc: netdev
Assuming 'opt' might be NULL, move the call to RTA_PAYLOAD to after the
check since it dereferences its parameter.
Signed-off-by: Phil Sutter <phil@nwl.cc>
---
Changes since v2:
- Dropped empty line between assignment and check.
---
tc/q_netem.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/tc/q_netem.c b/tc/q_netem.c
index 0975ae111de97..5a9e747411e85 100644
--- a/tc/q_netem.c
+++ b/tc/q_netem.c
@@ -538,7 +538,7 @@ static int netem_print_opt(struct qdisc_util *qu, FILE *f, struct rtattr *opt)
int *ecn = NULL;
struct tc_netem_qopt qopt;
const struct tc_netem_rate *rate = NULL;
- int len = RTA_PAYLOAD(opt) - sizeof(qopt);
+ int len;
__u64 rate64 = 0;
SPRINT_BUF(b1);
@@ -546,6 +546,7 @@ static int netem_print_opt(struct qdisc_util *qu, FILE *f, struct rtattr *opt)
if (opt == NULL)
return 0;
+ len = RTA_PAYLOAD(opt) - sizeof(qopt);
if (len < 0) {
fprintf(stderr, "options size error\n");
return -1;
--
2.13.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [iproute PATCH v4 3/4] tc/tc_filter: Make sure filter name is not empty
2017-08-24 9:46 [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 1/4] ifstat, nstat: Check fdopen() return value Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 2/4] tc/q_netem: Don't dereference possibly NULL pointer Phil Sutter
@ 2017-08-24 9:46 ` Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 4/4] tipc/bearer: Prevent NULL pointer dereference Phil Sutter
2017-08-24 21:51 ` [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Stephen Hemminger
4 siblings, 0 replies; 6+ messages in thread
From: Phil Sutter @ 2017-08-24 9:46 UTC (permalink / raw)
To: Stephen Hemminger; +Cc: netdev
The later check for 'k[0] != 0' requires a non-empty filter name,
otherwise NULL pointer dereference in 'q' might happen.
Signed-off-by: Phil Sutter <phil@nwl.cc>
---
Changes since v2:
- Instead of calling strlen(), just make sure **argv is not 0.
---
tc/tc_filter.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/tc/tc_filter.c b/tc/tc_filter.c
index b13fb9185d4fd..cf290ae8e252c 100644
--- a/tc/tc_filter.c
+++ b/tc/tc_filter.c
@@ -412,6 +412,9 @@ static int tc_filter_get(int cmd, unsigned int flags, int argc, char **argv)
usage();
return 0;
} else {
+ if (!**argv)
+ invarg("invalid filter name", *argv);
+
strncpy(k, *argv, sizeof(k)-1);
q = get_filter_kind(k);
--
2.13.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [iproute PATCH v4 4/4] tipc/bearer: Prevent NULL pointer dereference
2017-08-24 9:46 [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Phil Sutter
` (2 preceding siblings ...)
2017-08-24 9:46 ` [iproute PATCH v4 3/4] tc/tc_filter: Make sure filter name is not empty Phil Sutter
@ 2017-08-24 9:46 ` Phil Sutter
2017-08-24 21:51 ` [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Stephen Hemminger
4 siblings, 0 replies; 6+ messages in thread
From: Phil Sutter @ 2017-08-24 9:46 UTC (permalink / raw)
To: Stephen Hemminger; +Cc: netdev
Signed-off-by: Phil Sutter <phil@nwl.cc>
---
Changes since v2:
- Keep assignment and check in separate statements.
---
tipc/bearer.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tipc/bearer.c b/tipc/bearer.c
index c3d4491f8f6ef..0d84570150624 100644
--- a/tipc/bearer.c
+++ b/tipc/bearer.c
@@ -439,7 +439,7 @@ static int cmd_bearer_enable(struct nlmsghdr *nlh, const struct cmd *cmd,
return err;
opt = get_opt(opts, "media");
- if (strcmp(opt->val, "udp") == 0) {
+ if (opt && strcmp(opt->val, "udp") == 0) {
err = nl_add_udp_enable_opts(nlh, opts, cmdl);
if (err)
return err;
--
2.13.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences
2017-08-24 9:46 [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Phil Sutter
` (3 preceding siblings ...)
2017-08-24 9:46 ` [iproute PATCH v4 4/4] tipc/bearer: Prevent NULL pointer dereference Phil Sutter
@ 2017-08-24 21:51 ` Stephen Hemminger
4 siblings, 0 replies; 6+ messages in thread
From: Stephen Hemminger @ 2017-08-24 21:51 UTC (permalink / raw)
To: Phil Sutter; +Cc: netdev
On Thu, 24 Aug 2017 11:46:30 +0200
Phil Sutter <phil@nwl.cc> wrote:
> This series collects patches from v1 which eliminate possible cases of
> NULL pointer dereferences.
>
> Changes since v3:
> - Dropped upstream rejected patch 2.
>
> Phil Sutter (4):
> ifstat, nstat: Check fdopen() return value
> tc/q_netem: Don't dereference possibly NULL pointer
> tc/tc_filter: Make sure filter name is not empty
> tipc/bearer: Prevent NULL pointer dereference
>
> misc/ifstat.c | 16 +++++++++++-----
> misc/nstat.c | 16 +++++++++++-----
> tc/q_netem.c | 3 ++-
> tc/tc_filter.c | 3 +++
> tipc/bearer.c | 2 +-
> 5 files changed, 28 insertions(+), 12 deletions(-)
>
Applied. Thanks
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2017-08-24 21:51 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-08-24 9:46 [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 1/4] ifstat, nstat: Check fdopen() return value Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 2/4] tc/q_netem: Don't dereference possibly NULL pointer Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 3/4] tc/tc_filter: Make sure filter name is not empty Phil Sutter
2017-08-24 9:46 ` [iproute PATCH v4 4/4] tipc/bearer: Prevent NULL pointer dereference Phil Sutter
2017-08-24 21:51 ` [iproute PATCH v4 0/4] Covscan: Fix potential NULL pointer dereferences Stephen Hemminger
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).