Re: [PATCH] s390 keyboard: Avoid off-by-one when using strnlen_user()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed 03-06-15 09:50:30, Martin Schwidefsky wrote:
> On Tue,  2 Jun 2015 17:07:33 +0200
> Jan Kara <jack@xxxxxxx> wrote:
> 
> > strnlen_user() returns the length of the string including terminating 0.
> > So avoid counting it again and unnecessarily reducing maximum string
> > size by 1.
> > 
> > CC: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
> > Signed-off-by: Jan Kara <jack@xxxxxxx>
> > ---
> >  drivers/s390/char/keyboard.c | 8 +++-----
> >  1 file changed, 3 insertions(+), 5 deletions(-)
> > 
> > diff --git a/drivers/s390/char/keyboard.c b/drivers/s390/char/keyboard.c
> > index 01463b052ae7..e45541915a73 100644
> > --- a/drivers/s390/char/keyboard.c
> > +++ b/drivers/s390/char/keyboard.c
> > @@ -433,20 +433,18 @@ do_kdgkb_ioctl(struct kbd_data *kbd, struct kbsentry __user *u_kbs,
> >  	case KDSKBSENT:
> >  		if (!perm)
> >  			return -EPERM;
> > -		len = strnlen_user(u_kbs->kb_string,
> > -				   sizeof(u_kbs->kb_string) - 1);
> > +		len = strnlen_user(u_kbs->kb_string, sizeof(u_kbs->kb_string));
> >  		if (!len)
> >  			return -EFAULT;
> > -		if (len > sizeof(u_kbs->kb_string) - 1)
> > +		if (len > sizeof(u_kbs->kb_string))
> >  			return -EINVAL;
> > -		p = kmalloc(len + 1, GFP_KERNEL);
> > +		p = kmalloc(len, GFP_KERNEL);
> >  		if (!p)
> >  			return -ENOMEM;
> >  		if (copy_from_user(p, u_kbs->kb_string, len)) {
> >  			kfree(p);
> >  			return -EFAULT;
> >  		}
> > -		p[len] = 0;
> >  		kfree(kbd->func_table[kb_func]);
> >  		kbd->func_table[kb_func] = p;
> >  		break;
> 
> The simplification with the string length is nice but removing
> the explicit NUL termination is imho a mistake. Who guarantees
> you that the string in user space is still the same after the
> initial strnlen_user? It might have changed before the
> copy_from_user call and then we end up with an unterminated
> string in the kernel. Not good.
  Ah, that's a good point. Thanks for catching this. But it would deserve
a comment in the code. Attached is an updated patch.

								Honza
-- 
Jan Kara <jack@xxxxxxx>
SUSE Labs, CR
>From b73200d6924504e6250abc979331de94f8e31d9b Mon Sep 17 00:00:00 2001
From: Jan Kara <jack@xxxxxxx>
Date: Tue, 2 Jun 2015 12:38:39 +0200
Subject: [PATCH] s390 keyboard: Avoid off-by-one when using strnlen_user()

strnlen_user() returns the length of the string including terminating 0.
So avoid counting it again and unnecessarily reducing maximum string
size by 1.

CC: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
Signed-off-by: Jan Kara <jack@xxxxxxx>
---
 drivers/s390/char/keyboard.c | 13 ++++++++-----
 1 file changed, 8 insertions(+), 5 deletions(-)

diff --git a/drivers/s390/char/keyboard.c b/drivers/s390/char/keyboard.c
index 01463b052ae7..cdb180ea44f9 100644
--- a/drivers/s390/char/keyboard.c
+++ b/drivers/s390/char/keyboard.c
@@ -433,20 +433,23 @@ do_kdgkb_ioctl(struct kbd_data *kbd, struct kbsentry __user *u_kbs,
 	case KDSKBSENT:
 		if (!perm)
 			return -EPERM;
-		len = strnlen_user(u_kbs->kb_string,
-				   sizeof(u_kbs->kb_string) - 1);
+		len = strnlen_user(u_kbs->kb_string, sizeof(u_kbs->kb_string));
 		if (!len)
 			return -EFAULT;
-		if (len > sizeof(u_kbs->kb_string) - 1)
+		if (len > sizeof(u_kbs->kb_string))
 			return -EINVAL;
-		p = kmalloc(len + 1, GFP_KERNEL);
+		p = kmalloc(len, GFP_KERNEL);
 		if (!p)
 			return -ENOMEM;
 		if (copy_from_user(p, u_kbs->kb_string, len)) {
 			kfree(p);
 			return -EFAULT;
 		}
-		p[len] = 0;
+		/*
+		 * Make sure the string is terminated by 0. User could have
+		 * modified it between us running strnlen_user() and copying it.
+		 */
+		p[len-1] = 0;
 		kfree(kbd->func_table[kb_func]);
 		kbd->func_table[kb_func] = p;
 		break;
-- 
2.1.4


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Kernel Development]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite Info]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Linux Media]     [Device Mapper]

  Powered by Linux