summaryrefslogtreecommitdiff
path: root/net/9p/protocol.c
diff options
context:
space:
mode:
authorDominique Martinet <dominique.martinet@cea.fr>2018-09-07 18:36:08 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-07-10 10:56:35 +0300
commit33e0f07f6f29c6c3727b28c5c4a1576c04dec3af (patch)
tree9138fdde2b6a57668a8179a1b4a31c00e5923539 /net/9p/protocol.c
parent3479b3c35e82ed10aa0ca2ee9e78c4eded06ba62 (diff)
downloadlinux-33e0f07f6f29c6c3727b28c5c4a1576c04dec3af.tar.xz
9p: p9dirent_read: check network-provided name length
[ Upstream commit ef5305f1f72eb1cfcda25c382bb0368509c0385b ] strcpy to dirent->d_name could overflow the buffer, use strscpy to check the provided string length and error out if the size was too big. While we are here, make the function return an error when the pdu parsing failed, instead of returning the pdu offset as if it had been a success... Link: http://lkml.kernel.org/r/1536339057-21974-4-git-send-email-asmadeus@codewreck.org Addresses-Coverity-ID: 139133 ("Copy into fixed size buffer") Signed-off-by: Dominique Martinet <dominique.martinet@cea.fr> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'net/9p/protocol.c')
-rw-r--r--net/9p/protocol.c12
1 files changed, 9 insertions, 3 deletions
diff --git a/net/9p/protocol.c b/net/9p/protocol.c
index 7f1b45c082c9..ed1e39ccaebf 100644
--- a/net/9p/protocol.c
+++ b/net/9p/protocol.c
@@ -622,13 +622,19 @@ int p9dirent_read(struct p9_client *clnt, char *buf, int len,
if (ret) {
p9_debug(P9_DEBUG_9P, "<<< p9dirent_read failed: %d\n", ret);
trace_9p_protocol_dump(clnt, &fake_pdu);
- goto out;
+ return ret;
}
- strcpy(dirent->d_name, nameptr);
+ ret = strscpy(dirent->d_name, nameptr, sizeof(dirent->d_name));
+ if (ret < 0) {
+ p9_debug(P9_DEBUG_ERROR,
+ "On the wire dirent name too long: %s\n",
+ nameptr);
+ kfree(nameptr);
+ return ret;
+ }
kfree(nameptr);
-out:
return fake_pdu.offset;
}
EXPORT_SYMBOL(p9dirent_read);