* [PATCH] tcp: Explicitly check option length field values in tcp_opt_get()
@ 2023-01-04 17:44 Stefano Brivio
2023-01-05 4:34 ` David Gibson
0 siblings, 1 reply; 2+ messages in thread
From: Stefano Brivio @ 2023-01-04 17:44 UTC (permalink / raw)
To: passt-dev
Reported by Coverity (CWE-606, Untrusted loop bound), and actually
harmless because we'll exit the option-scanning loop if the remaining
length is not enough for a new option, instead of reading past the
header.
In any case, it looks like a good idea to explicitly check for
reasonable values of option lengths.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
---
tcp.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/tcp.c b/tcp.c
index 26037b3..1e0a338 100644
--- a/tcp.c
+++ b/tcp.c
@@ -1117,6 +1117,10 @@ static int tcp_opt_get(const char *opts, size_t len, uint8_t type_find,
break;
default:
type = *(opts++);
+
+ if (*(uint8_t *)opts < 2 || *(uint8_t *)opts > len)
+ return -1;
+
optlen = *(opts++) - 2;
len -= 2;
--
@@ -1117,6 +1117,10 @@ static int tcp_opt_get(const char *opts, size_t len, uint8_t type_find,
break;
default:
type = *(opts++);
+
+ if (*(uint8_t *)opts < 2 || *(uint8_t *)opts > len)
+ return -1;
+
optlen = *(opts++) - 2;
len -= 2;
--
2.35.1
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH] tcp: Explicitly check option length field values in tcp_opt_get()
2023-01-04 17:44 [PATCH] tcp: Explicitly check option length field values in tcp_opt_get() Stefano Brivio
@ 2023-01-05 4:34 ` David Gibson
0 siblings, 0 replies; 2+ messages in thread
From: David Gibson @ 2023-01-05 4:34 UTC (permalink / raw)
To: Stefano Brivio; +Cc: passt-dev
[-- Attachment #1: Type: text/plain, Size: 1166 bytes --]
On Wed, Jan 04, 2023 at 06:44:21PM +0100, Stefano Brivio wrote:
> Reported by Coverity (CWE-606, Untrusted loop bound), and actually
> harmless because we'll exit the option-scanning loop if the remaining
> length is not enough for a new option, instead of reading past the
> header.
>
> In any case, it looks like a good idea to explicitly check for
> reasonable values of option lengths.
>
> Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
> ---
> tcp.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
> diff --git a/tcp.c b/tcp.c
> index 26037b3..1e0a338 100644
> --- a/tcp.c
> +++ b/tcp.c
> @@ -1117,6 +1117,10 @@ static int tcp_opt_get(const char *opts, size_t len, uint8_t type_find,
> break;
> default:
> type = *(opts++);
> +
> + if (*(uint8_t *)opts < 2 || *(uint8_t *)opts > len)
> + return -1;
> +
> optlen = *(opts++) - 2;
> len -= 2;
>
--
David Gibson | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_
| _way_ _around_!
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2023-01-05 5:45 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-01-04 17:44 [PATCH] tcp: Explicitly check option length field values in tcp_opt_get() Stefano Brivio
2023-01-05 4:34 ` David Gibson
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).