1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-25 09:34:11 +00:00

net/netatalk3: Fix more crashes due to overly tight checks

The check for off/len equal to 0 seems incorrect since both should be
allowed in general.  The main validity check will ensure that all types
are correctly handled.

In addition, add more logging to it's easier to spot conditions that
could be breaking things.

PR:		263743
This commit is contained in:
Joe Marcus Clarke 2022-05-08 16:52:28 -04:00
parent d130ebdc0a
commit ad0b2e636d
2 changed files with 74 additions and 3 deletions

View File

@ -2,7 +2,7 @@
PORTNAME= netatalk
PORTVERSION= 3.1.13
PORTREVISION= 1
PORTREVISION= 2
PORTEPOCH= 1
CATEGORIES= net
MASTER_SITES= SF

View File

@ -1,6 +1,64 @@
--- libatalk/adouble/ad_open.c.orig 2022-05-01 19:20:45 UTC
--- libatalk/adouble/ad_open.c.orig 2022-03-22 04:44:25 UTC
+++ libatalk/adouble/ad_open.c
@@ -1637,6 +1637,10 @@ void *ad_entry(const struct adouble *ad, int eid)
@@ -1574,6 +1574,8 @@ static bool ad_entry_check_size(uint32_t eid,
uint32_t required_len;
if (eid >= ADEID_MAX) {
+ LOG(log_error, logtype_ad, "ad_entry_check_size %d is greater than %d",
+ eid, ADEID_MAX);
return false;
}
if (got_len == 0) {
@@ -1585,6 +1587,7 @@ static bool ad_entry_check_size(uint32_t eid,
* Shouldn't happen: implicitly initialized to zero because
* explicit initializer missing.
*/
+ LOG(log_error, logtype_ad, "ad_entry_check_size explicit initializer missing");
return false;
}
if (ad_checks[eid].expected_len == -1) {
@@ -1594,6 +1597,8 @@ static bool ad_entry_check_size(uint32_t eid,
if (ad_checks[eid].fixed_size) {
if (ad_checks[eid].expected_len != got_len) {
/* Wrong size fo fixed size entry. */
+ LOG(log_error, logtype_ad, "ad_entry_check_size wrong size to fixed size entry (%d != %d)",
+ ad_checks[eid].expected_len, got_len);
return false;
}
required_len = got_len;
@@ -1604,12 +1609,16 @@ static bool ad_entry_check_size(uint32_t eid,
* Too small for variable sized entry with
* minimum size.
*/
+ LOG(log_error, logtype_ad, "ad_entry_check_size too small for variable sized entry (%d < %d)",
+ got_len, ad_checks[eid].expected_len);
return false;
}
required_len = got_len;
} else {
if (got_len > ad_checks[eid].expected_len) {
/* Too big for variable sized entry. */
+ LOG(log_error, logtype_ad, "ad_entry_check_size too big for variable sized entry (%d > %d)",
+ got_len, ad_checks[eid].expected_len);
return false;
}
/*
@@ -1621,10 +1630,14 @@ static bool ad_entry_check_size(uint32_t eid,
}
if (off + required_len < off) {
/* wrap around */
+ LOG(log_error, logtype_ad, "ad_entry_check_size wrap around (%d + %d < %d)",
+ off, required_len, off);
return false;
}
if (off + required_len > bufsize) {
/* overflow */
+ LOG(log_error, logtype_ad, "ad_entry_check_size overflow (%d + %d > %d)",
+ off, required_len, bufsize);
return false;
}
return true;
@@ -1637,14 +1650,21 @@ void *ad_entry(const struct adouble *ad, int eid)
size_t len = ad_getentrylen(ad, eid);
bool valid;
@ -10,4 +68,17 @@
+
valid = ad_entry_check_size(eid, bufsize, off, len);
if (!valid) {
+ LOG(log_error, logtype_ad, "ad_entry: not valid");
return NULL;
}
- if (off == 0 || len == 0) {
+ /*if (off == 0 || len == 0) {
+ LOG(log_error, logtype_ad, "ad_entry: off or len is 0 (off: %d, len: %d)",
+ off, len);
return NULL;
- }
+ }*/
return ((struct adouble *)ad)->ad_data + off;
}