mirror of
https://github.com/netdata/libbpf.git
synced 2026-03-20 16:29:07 +08:00
libbpf: Fix out-of-bound read
In `set_kcfg_value_str`, an untrusted string is accessed with the assumption that it will be at least two characters long due to the presence of checks for opening and closing quotes. But the check for the closing quote (value[len - 1] != '"') misses the fact that it could be checking the opening quote itself in case of an invalid input that consists of just the opening quote. This commit adds an explicit check to make sure the string is at least two characters long. Signed-off-by: Nandakumar Edamana <nandakumar@nandakumar.co.in> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/bpf/20250221210110.3182084-1-nandakumar@nandakumar.co.in Signed-off-by: Ihor Solodrai <ihor.solodrai@linux.dev>
This commit is contained in:
committed by
Andrii Nakryiko
parent
4c893341f5
commit
82f60c9b5e
@@ -2106,7 +2106,7 @@ static int set_kcfg_value_str(struct extern_desc *ext, char *ext_val,
|
||||
}
|
||||
|
||||
len = strlen(value);
|
||||
if (value[len - 1] != '"') {
|
||||
if (len < 2 || value[len - 1] != '"') {
|
||||
pr_warn("extern (kcfg) '%s': invalid string config '%s'\n",
|
||||
ext->name, value);
|
||||
return -EINVAL;
|
||||
|
||||
Reference in New Issue
Block a user