1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-10-19 02:29:40 +00:00

dtrace: fix an out of bound read and a NULL pointer increment

In dt_cc.c when the provider is an empty string, accessing
strlen(pdp->dtpd_provider) - 1 will result in a pdp->dtpd_provider[-1]
access.

Similarly, in dt_ident.c, if p2 is a NULL pointer, doing a p2++ on it is
undefined behaviour.

Reviewed by:	markj
Sponsored by:	Google

(cherry picked from commit a877965fa3)
This commit is contained in:
Domagoj Stolfa 2021-06-17 13:35:33 -04:00 committed by Mark Johnston
parent d16b938e73
commit 1bf7ee1ab5
2 changed files with 8 additions and 2 deletions

View File

@ -1691,6 +1691,7 @@ dt_setcontext(dtrace_hdl_t *dtp, dtrace_probedesc_t *pdp)
dt_ident_t *idp;
char attrstr[8];
int err;
size_t prov_len;
/*
* Both kernel and pid based providers are allowed to have names
@ -1704,7 +1705,10 @@ dt_setcontext(dtrace_hdl_t *dtp, dtrace_probedesc_t *pdp)
* On an error, dt_pid_create_probes() will set the error message
* and tag -- we just have to longjmp() out of here.
*/
if (isdigit(pdp->dtpd_provider[strlen(pdp->dtpd_provider) - 1]) &&
prov_len = strlen(pdp->dtpd_provider);
if ((prov_len > 0 && isdigit(pdp->dtpd_provider[prov_len - 1])) &&
((pvp = dt_provider_lookup(dtp, pdp->dtpd_provider)) == NULL ||
pvp->pv_desc.dtvd_priv.dtpp_flags & DTRACE_PRIV_PROC) &&
dt_pid_create_probes(pdp, dtp, yypcb) != 0) {

View File

@ -210,8 +210,10 @@ dt_idcook_func(dt_node_t *dnp, dt_ident_t *idp, int argc, dt_node_t *args)
}
}
for (p2 = strchr(p2, ','); p2++ != NULL; i++)
for (p2 = strchr(p2, ','); p2 != NULL; i++) {
p2++;
p2 = strchr(p2, ',');
}
/*
* We first allocate a new ident signature structure with the