mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-01 11:46:49 +07:00
libceph: fix overflow in __decode_pool_names()
`len' is read from network and thus needs validation. Otherwise a large `len' would cause out-of-bounds access via the memcpy() call. In addition, len = 0xffffffff would overflow the kmalloc() size, leading to out-of-bounds write. This patch adds a check of `len' via ceph_decode_need(). Also use kstrndup rather than kmalloc/memcpy. [elder@inktank.com: added -ENOMEM return for null kstrndup() result] Signed-off-by: Xi Wang <xi.wang@gmail.com> Reviewed-by: Alex Elder <elder@inktank.com>
This commit is contained in:
parent
43643528cc
commit
ad3b904c07
@ -488,15 +488,16 @@ static int __decode_pool_names(void **p, void *end, struct ceph_osdmap *map)
|
|||||||
ceph_decode_32_safe(p, end, pool, bad);
|
ceph_decode_32_safe(p, end, pool, bad);
|
||||||
ceph_decode_32_safe(p, end, len, bad);
|
ceph_decode_32_safe(p, end, len, bad);
|
||||||
dout(" pool %d len %d\n", pool, len);
|
dout(" pool %d len %d\n", pool, len);
|
||||||
|
ceph_decode_need(p, end, len, bad);
|
||||||
pi = __lookup_pg_pool(&map->pg_pools, pool);
|
pi = __lookup_pg_pool(&map->pg_pools, pool);
|
||||||
if (pi) {
|
if (pi) {
|
||||||
|
char *name = kstrndup(*p, len, GFP_NOFS);
|
||||||
|
|
||||||
|
if (!name)
|
||||||
|
return -ENOMEM;
|
||||||
kfree(pi->name);
|
kfree(pi->name);
|
||||||
pi->name = kmalloc(len + 1, GFP_NOFS);
|
pi->name = name;
|
||||||
if (pi->name) {
|
dout(" name is %s\n", pi->name);
|
||||||
memcpy(pi->name, *p, len);
|
|
||||||
pi->name[len] = '\0';
|
|
||||||
dout(" name is %s\n", pi->name);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
*p += len;
|
*p += len;
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user