Skip to content

Commit

Permalink
asn1: additional sanity checking during BER decoding
Browse files Browse the repository at this point in the history
- Don't trust a length which is greater than the working buffer.
  An invalid length could cause overflow when calculating buffer size
  for decoding oid.

- An oid length of zero is invalid and allows for an off-by-one error when
  decoding oid because the first subid actually encodes first 2 subids.

- A primitive encoding may not have an indefinite length.

Thanks to Wei Wang from McAfee for report.

Cc: Steven French <[email protected]>
Cc: [email protected]
Acked-by: Patrick McHardy <[email protected]>
Signed-off-by: Chris Wright <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
  • Loading branch information
chriswright authored and torvalds committed Jun 5, 2008
1 parent efedf51 commit ddb2c43
Show file tree
Hide file tree
Showing 2 changed files with 28 additions and 0 deletions.
14 changes: 14 additions & 0 deletions fs/cifs/asn1.c
Original file line number Diff line number Diff line change
Expand Up @@ -186,6 +186,11 @@ asn1_length_decode(struct asn1_ctx *ctx, unsigned int *def, unsigned int *len)
}
}
}

/* don't trust len bigger than ctx buffer */
if (*len > ctx->end - ctx->pointer)
return 0;

return 1;
}

Expand All @@ -203,6 +208,10 @@ asn1_header_decode(struct asn1_ctx *ctx,
if (!asn1_length_decode(ctx, &def, &len))
return 0;

/* primitive shall be definite, indefinite shall be constructed */
if (*con == ASN1_PRI && !def)
return 0;

if (def)
*eoc = ctx->pointer + len;
else
Expand Down Expand Up @@ -389,6 +398,11 @@ asn1_oid_decode(struct asn1_ctx *ctx,
unsigned long *optr;

size = eoc - ctx->pointer + 1;

/* first subid actually encodes first two subids */
if (size < 2 || size > ULONG_MAX/sizeof(unsigned long))
return 0;

*oid = kmalloc(size * sizeof(unsigned long), GFP_ATOMIC);
if (*oid == NULL)
return 0;
Expand Down
14 changes: 14 additions & 0 deletions net/ipv4/netfilter/nf_nat_snmp_basic.c
Original file line number Diff line number Diff line change
Expand Up @@ -232,6 +232,11 @@ static unsigned char asn1_length_decode(struct asn1_ctx *ctx,
}
}
}

/* don't trust len bigger than ctx buffer */
if (*len > ctx->end - ctx->pointer)
return 0;

return 1;
}

Expand All @@ -250,6 +255,10 @@ static unsigned char asn1_header_decode(struct asn1_ctx *ctx,
if (!asn1_length_decode(ctx, &def, &len))
return 0;

/* primitive shall be definite, indefinite shall be constructed */
if (*con == ASN1_PRI && !def)
return 0;

if (def)
*eoc = ctx->pointer + len;
else
Expand Down Expand Up @@ -434,6 +443,11 @@ static unsigned char asn1_oid_decode(struct asn1_ctx *ctx,
unsigned long *optr;

size = eoc - ctx->pointer + 1;

/* first subid actually encodes first two subids */
if (size < 2 || size > ULONG_MAX/sizeof(unsigned long))
return 0;

*oid = kmalloc(size * sizeof(unsigned long), GFP_ATOMIC);
if (*oid == NULL) {
if (net_ratelimit())
Expand Down

0 comments on commit ddb2c43

Please sign in to comment.