* [PATCH] xt_recent: Fix buffer overflow
@ 2010-02-19 17:48 Tim Gardner
2010-02-19 20:57 ` Jan Engelhardt
0 siblings, 1 reply; 4+ messages in thread
From: Tim Gardner @ 2010-02-19 17:48 UTC (permalink / raw)
To: kaber; +Cc: coreteam, netfilter-devel, netfilter
>From 478a6cbbd7646c78370da48677e99cc602076dd7 Mon Sep 17 00:00:00 2001
From: Tim Gardner <tim.gardner@canonical.com>
Date: Thu, 18 Feb 2010 20:04:51 -0700
Subject: [PATCH] xt_recent: Fix buffer overflow
e->index overflows e->stamps[] every ip_pkt_list_tot
packets.
Consider the case when ip_pkt_list_tot==1; the first packet received is stored
in e->stamps[0] and e->index is initialized to 1. The next received packet
timestamp is then stored at e->stamps[1] in recent_entry_update(),
a buffer overflow because the maximum e->stamps[] index is 0.
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
Cc: stable@kernel.org
---
net/netfilter/xt_recent.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/net/netfilter/xt_recent.c b/net/netfilter/xt_recent.c
index fc70a49..1bb0d6c 100644
--- a/net/netfilter/xt_recent.c
+++ b/net/netfilter/xt_recent.c
@@ -173,10 +173,10 @@ recent_entry_init(struct recent_table *t, const union nf_inet_addr *addr,
static void recent_entry_update(struct recent_table *t, struct recent_entry *e)
{
+ e->index %= ip_pkt_list_tot;
e->stamps[e->index++] = jiffies;
if (e->index > e->nstamps)
e->nstamps = e->index;
- e->index %= ip_pkt_list_tot;
list_move_tail(&e->lru_list, &t->lru_list);
}
--
1.6.2.4
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] xt_recent: Fix buffer overflow
2010-02-19 17:48 [PATCH] xt_recent: Fix buffer overflow Tim Gardner
@ 2010-02-19 20:57 ` Jan Engelhardt
2010-02-19 21:38 ` Tim Gardner
0 siblings, 1 reply; 4+ messages in thread
From: Jan Engelhardt @ 2010-02-19 20:57 UTC (permalink / raw)
To: Tim Gardner; +Cc: kaber, coreteam, netfilter-devel, netfilter
On Friday 2010-02-19 18:48, Tim Gardner wrote:
>
>Consider the case when ip_pkt_list_tot==1; the first packet received is stored
>in e->stamps[0] and e->index is initialized to 1. The next received packet
>timestamp is then stored at e->stamps[1] in recent_entry_update(),
>a buffer overflow because the maximum e->stamps[] index is 0.
>@@ -173,10 +173,10 @@ recent_entry_init(struct recent_table *t, const union nf_inet_addr *addr,
>
> static void recent_entry_update(struct recent_table *t, struct recent_entry *e)
> {
>+ e->index %= ip_pkt_list_tot;
> e->stamps[e->index++] = jiffies;
> if (e->index > e->nstamps)
> e->nstamps = e->index;
>- e->index %= ip_pkt_list_tot;
> list_move_tail(&e->lru_list, &t->lru_list);
> }
Let's analyze in 3-step manner:
Claim: writes always happen to e->stamps[0]
Prereqs: ip_pkt_list_tot==1
Proof:
Start with assumption that e->index's possible values at the
start of the function are {0}.
The timestamp is thus always stored in e->stamps[0].
e->index is bumped from 0 to 1.
The %= op clamps it back to 0.
The possible values at the end of the function are thus {0}.
Assumption holds and matches the result set exactly.
Outside of the function you will thus never see e->index != 0.
This does not seem much different from your proposed patch,
which reads like:
Claim: same
Prereq: same
Proof:
e->index's possible start values are {0,1}.
The %= op clamps this to {0}.
The timestamp is always stored in e->stamps[0].
e->index is increased by one.
The possible values at the end of the function are {1}.
Assumption holds, but is a superset of the result set.
Outside of the function, you may see e->index != 0.
So both variations of the code do the same, except yours seems to
have the additional potential pitfall that e->index is not within the
ring of modulus after the function has been executed.
Where would the thinko be?
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] xt_recent: Fix buffer overflow
2010-02-19 20:57 ` Jan Engelhardt
@ 2010-02-19 21:38 ` Tim Gardner
2010-02-23 13:56 ` Patrick McHardy
0 siblings, 1 reply; 4+ messages in thread
From: Tim Gardner @ 2010-02-19 21:38 UTC (permalink / raw)
To: Jan Engelhardt; +Cc: kaber, coreteam, netfilter-devel, netfilter
Jan Engelhardt wrote:
> On Friday 2010-02-19 18:48, Tim Gardner wrote:
>> Consider the case when ip_pkt_list_tot==1; the first packet received is stored
>> in e->stamps[0] and e->index is initialized to 1. The next received packet
>> timestamp is then stored at e->stamps[1] in recent_entry_update(),
>> a buffer overflow because the maximum e->stamps[] index is 0.
>
>> @@ -173,10 +173,10 @@ recent_entry_init(struct recent_table *t, const union nf_inet_addr *addr,
>>
>> static void recent_entry_update(struct recent_table *t, struct recent_entry *e)
>> {
>> + e->index %= ip_pkt_list_tot;
>> e->stamps[e->index++] = jiffies;
>> if (e->index > e->nstamps)
>> e->nstamps = e->index;
>> - e->index %= ip_pkt_list_tot;
>> list_move_tail(&e->lru_list, &t->lru_list);
>> }
>
> Let's analyze in 3-step manner:
>
> Claim: writes always happen to e->stamps[0]
> Prereqs: ip_pkt_list_tot==1
> Proof:
> Start with assumption that e->index's possible values at the
> start of the function are {0}.
This assumption is the root of the bug. e->index is initialized to 1 in
recent_entry_init() which means that its already out of bounds when next
recent_entry_update() is called.
> The timestamp is thus always stored in e->stamps[0].
> e->index is bumped from 0 to 1.
> The %= op clamps it back to 0.
> The possible values at the end of the function are thus {0}.
> Assumption holds and matches the result set exactly.
> Outside of the function you will thus never see e->index != 0.
>
> This does not seem much different from your proposed patch,
> which reads like:
>
> Claim: same
> Prereq: same
> Proof:
> e->index's possible start values are {0,1}.
> The %= op clamps this to {0}.
> The timestamp is always stored in e->stamps[0].
> e->index is increased by one.
> The possible values at the end of the function are {1}.
> Assumption holds, but is a superset of the result set.
> Outside of the function, you may see e->index != 0.
>
>
> So both variations of the code do the same, except yours seems to
> have the additional potential pitfall that e->index is not within the
> ring of modulus after the function has been executed.
>
>
> Where would the thinko be?
>
rtg
--
Tim Gardner timg@tpi.com www.tpi.com
OR 503-601-0234 x102 MT 406-443-5357
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] xt_recent: Fix buffer overflow
2010-02-19 21:38 ` Tim Gardner
@ 2010-02-23 13:56 ` Patrick McHardy
0 siblings, 0 replies; 4+ messages in thread
From: Patrick McHardy @ 2010-02-23 13:56 UTC (permalink / raw)
To: timg; +Cc: Jan Engelhardt, coreteam, netfilter-devel, netfilter
Tim Gardner wrote:
> Jan Engelhardt wrote:
>> On Friday 2010-02-19 18:48, Tim Gardner wrote:
>>> Consider the case when ip_pkt_list_tot==1; the first packet received is stored
>>> in e->stamps[0] and e->index is initialized to 1. The next received packet
>>> timestamp is then stored at e->stamps[1] in recent_entry_update(),
>>> a buffer overflow because the maximum e->stamps[] index is 0.
>>> @@ -173,10 +173,10 @@ recent_entry_init(struct recent_table *t, const union nf_inet_addr *addr,
>>>
>>> static void recent_entry_update(struct recent_table *t, struct recent_entry *e)
>>> {
>>> + e->index %= ip_pkt_list_tot;
>>> e->stamps[e->index++] = jiffies;
>>> if (e->index > e->nstamps)
>>> e->nstamps = e->index;
>>> - e->index %= ip_pkt_list_tot;
>>> list_move_tail(&e->lru_list, &t->lru_list);
>>> }
>> Let's analyze in 3-step manner:
>>
>> Claim: writes always happen to e->stamps[0]
>> Prereqs: ip_pkt_list_tot==1
>> Proof:
>> Start with assumption that e->index's possible values at the
>> start of the function are {0}.
>
> This assumption is the root of the bug. e->index is initialized to 1 in
> recent_entry_init() which means that its already out of bounds when next
> recent_entry_update() is called.
This patch looks correct to me. Applied, thanks Tim.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2010-02-23 13:56 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-02-19 17:48 [PATCH] xt_recent: Fix buffer overflow Tim Gardner
2010-02-19 20:57 ` Jan Engelhardt
2010-02-19 21:38 ` Tim Gardner
2010-02-23 13:56 ` Patrick McHardy
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).