Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix string operation truncation #285

Merged
merged 4 commits into from
Mar 31, 2025

Conversation

lumynou5
Copy link
Contributor

This patch fixes potential truncation caused by strncpy. If the destination buffer was not large enough, the string would be not null-terminated, and possibly lead to buffer overflow because of the passed buffer length depending on the source buffer.

Change-Id: I8f99658d599400113c7c215a401aea01da28aec9
Change-Id: Id7f150d4ac6b5229716c646f970a2a5c14a5ede5
@@ -9,6 +9,6 @@ char *web_recv(int fd, struct sockaddr_in *clientaddr);

void web_send(int out_fd, char *buffer);

int web_eventmux(char *buf);
int web_eventmux(char *buf, size_t buflen);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you want to change the function prototype, there must be a good reason.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The original callback doesn't take the length of the buffer. This may result buffer overflow.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, the compiler reports stringop-truncation warning for this, and stop compilation with -O3.

Copy link
Contributor

@jserv jserv left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Make commit messages informative and reflect what you propose to change.

@lumynou5
Copy link
Contributor Author

Don't the titles describe the change? The first is an obvious mistake that the variable name is wrong, and the third fixes the buffer overflow, as the commit messages say. I suppose the reason of the overflow is also obvious because a buffer always has a finite length?
Or should I note why the function prototype has to be changed? Add a body without repetition of the title but the fact that it couldn't compile.

@jserv
Copy link
Contributor

jserv commented Mar 29, 2025

Don't the titles describe the change?

No, show the details and discuss the impact within git commit messages. Always make the development verbose and informative.

This changes the parameter list of the eventmux callback, affecting the
header and the implementation of the dependency linenoise, but it is
necessary to prevent potential buffer overflow and to make the program
compile with '-O3'.

Change-Id: Ic50650107e939677a286f129251c50ce2dcbf635
@lumynou5 lumynou5 force-pushed the fix-stringop-truncation branch from cb85746 to a3539f1 Compare March 31, 2025 10:58
The buffer length passed to the callback is the actual length minus 1,
so 'buflen' is not out-of-bounds but exactly the last byte of the
buffer.

Change-Id: I63a2bb1928c80f5c78dac7133133ad2c89f82e5f
@lumynou5 lumynou5 requested a review from jserv March 31, 2025 11:03
@jserv jserv merged commit 599de0f into sysprog21:master Mar 31, 2025
1 of 2 checks passed
@jserv
Copy link
Contributor

jserv commented Mar 31, 2025

Thank @lumynou5 for contributing!

@lumynou5 lumynou5 deleted the fix-stringop-truncation branch April 2, 2025 10:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants