[systemd-devel] [PATCH] libudev-monitor: ensure proper string termination
Lennart Poettering
lennart at poettering.net
Mon Jan 26 16:19:57 PST 2015
On Sun, 25.01.15 07:10, Topi Miettinen (toiwoton at gmail.com) wrote:
> On 01/25/15 03:34, Zbigniew Jędrzejewski-Szmek wrote:
> > On Sat, Jan 24, 2015 at 10:39:56AM +0200, Topi Miettinen wrote:
> >> Leave space for the terminating zero when reading and make sure
> >> that the last byte is zero. This also makes the check for long packets
> >> equivalent to code before 9c89c1ca: reject also packets with size 8192.
> >> ---
> >> src/libudev/libudev-monitor.c | 4 +++-
> >> 1 file changed, 3 insertions(+), 1 deletion(-)
> >>
> >> diff --git a/src/libudev/libudev-monitor.c b/src/libudev/libudev-monitor.c
> >> index 4cfb2f6..b7fc031 100644
> >> --- a/src/libudev/libudev-monitor.c
> >> +++ b/src/libudev/libudev-monitor.c
> >> @@ -590,7 +590,7 @@ retry:
> >> if (udev_monitor == NULL)
> >> return NULL;
> >> iov.iov_base = &buf;
> >> - iov.iov_len = sizeof(buf);
> >> + iov.iov_len = sizeof(buf) - 1; /* Leave space for terminating zero */
> >> memzero(&smsg, sizeof(struct msghdr));
> >> smsg.msg_iov = &iov;
> >> smsg.msg_iovlen = 1;
> >> @@ -642,6 +642,8 @@ retry:
> >> if (udev_device == NULL)
> >> return NULL;
> >>
> >> + buf.raw[sizeof(buf.raw) - 1] = '\0';
> >> +
> >> if (memcmp(buf.raw, "libudev", 8) == 0) {
> >> /* udev message needs proper version magic */
> >> if (buf.nlh.magic != htonl(UDEV_MONITOR_MAGIC)) {
> > A buffer only needs to be terminated by a zero in certain cases: usually if it
> > is passed to a function which expectes that. iovecs can contain binary data,
> > and have an explicit size field, so they do not need to be zero-terminated.
> > Is there a reason why the buffer has to be zero-terminated in this case?
>
> String functions strcmp, strlen and strstr, used a few lines later,
> expect null byte terminated strings. Alternatively they could be changed
> to strncmp and friends where the scope can be limited to only the buffer.
But the data comes from the kernel (and that's verified, securely),
hence I am wondering what kind of vulnerability you have precisely in
mind. If we don't trust the kernel, then we'll have quite a problem...
Lennart
--
Lennart Poettering, Red Hat
More information about the systemd-devel
mailing list