idx
int64
func_before
string
Vulnerability Classification
string
vul
int64
func_after
string
patch
string
CWE ID
string
lines_before
string
lines_after
string
6,900
size_t mptsas_config_manufacturing_4(MPTSASState *s, uint8_t **data, int address) { /* All zeros */ return MPTSAS_CONFIG_PACK(4, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x05, "*l*b*b*b*b*b*b*w*s56*l*l*l*l*l*l" "*b*b*w*b*b*w*l*l"); }
DoS
0
size_t mptsas_config_manufacturing_4(MPTSASState *s, uint8_t **data, int address) { /* All zeros */ return MPTSAS_CONFIG_PACK(4, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x05, "*l*b*b*b*b*b*b*w*s56*l*l*l*l*l*l" "*b*b*w*b*b*w*l*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,901
size_t mptsas_config_manufacturing_5(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(5, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x02, "q*b*b*w*l*l", s->sas_addr); }
DoS
0
size_t mptsas_config_manufacturing_5(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(5, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x02, "q*b*b*w*l*l", s->sas_addr); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,902
size_t mptsas_config_manufacturing_6(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(6, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
DoS
0
size_t mptsas_config_manufacturing_6(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(6, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,903
size_t mptsas_config_manufacturing_8(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(8, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
DoS
0
size_t mptsas_config_manufacturing_8(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(8, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,904
static size_t mptsas_config_pack(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret / 4 < 256 && (ret % 4) == 0); stb_p(*data + 1, ret / 4); } return ret; }
DoS
0
static size_t mptsas_config_pack(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret / 4 < 256 && (ret % 4) == 0); stb_p(*data + 1, ret / 4); } return ret; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,905
static size_t mptsas_config_pack_ext(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret < 65536 && (ret % 4) == 0); stw_le_p(*data + 4, ret / 4); } return ret; }
DoS
0
static size_t mptsas_config_pack_ext(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret < 65536 && (ret % 4) == 0); stw_le_p(*data + 4, ret / 4); } return ret; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,906
size_t mptsas_config_phy_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_phy_addr_get(s, address); if (i < 0) { trace_mptsas_config_sas_phy(s, address, i, phy_handle, dev_handle, 1); return i; } (void) mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_phy(s, address, i, phy_handle, dev_handle, 1); return MPTSAS_CONFIG_PACK_EXT(1, MPI_CONFIG_EXTPAGETYPE_SAS_PHY, 0x01, "*l*l*l*l*l"); }
DoS
0
size_t mptsas_config_phy_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_phy_addr_get(s, address); if (i < 0) { trace_mptsas_config_sas_phy(s, address, i, phy_handle, dev_handle, 1); return i; } (void) mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_phy(s, address, i, phy_handle, dev_handle, 1); return MPTSAS_CONFIG_PACK_EXT(1, MPI_CONFIG_EXTPAGETYPE_SAS_PHY, 0x01, "*l*l*l*l*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,907
size_t mptsas_config_sas_device_0(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, dev_handle, 0); if (!dev) { return -ENOENT; } return MPTSAS_CONFIG_PACK_EXT(0, MPI_CONFIG_EXTPAGETYPE_SAS_DEVICE, 0x05, "*w*wqwbbwbblwb*b", dev->wwn, phy_handle, i, MPI_SAS_DEVICE0_ASTATUS_NO_ERRORS, dev_handle, i, 0, MPI_SAS_DEVICE_INFO_END_DEVICE | MPI_SAS_DEVICE_INFO_SSP_TARGET, (MPI_SAS_DEVICE0_FLAGS_DEVICE_PRESENT | MPI_SAS_DEVICE0_FLAGS_DEVICE_MAPPED | MPI_SAS_DEVICE0_FLAGS_MAPPING_PERSISTENT), i); }
DoS
0
size_t mptsas_config_sas_device_0(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, dev_handle, 0); if (!dev) { return -ENOENT; } return MPTSAS_CONFIG_PACK_EXT(0, MPI_CONFIG_EXTPAGETYPE_SAS_DEVICE, 0x05, "*w*wqwbbwbblwb*b", dev->wwn, phy_handle, i, MPI_SAS_DEVICE0_ASTATUS_NO_ERRORS, dev_handle, i, 0, MPI_SAS_DEVICE_INFO_END_DEVICE | MPI_SAS_DEVICE_INFO_SSP_TARGET, (MPI_SAS_DEVICE0_FLAGS_DEVICE_PRESENT | MPI_SAS_DEVICE0_FLAGS_DEVICE_MAPPED | MPI_SAS_DEVICE0_FLAGS_MAPPING_PERSISTENT), i); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,908
size_t mptsas_config_sas_device_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, dev_handle, 1); if (!dev) { return -ENOENT; } return MPTSAS_CONFIG_PACK_EXT(1, MPI_CONFIG_EXTPAGETYPE_SAS_DEVICE, 0x00, "*lq*lwbb*s20", dev->wwn, dev_handle, i, 0); }
DoS
0
size_t mptsas_config_sas_device_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, dev_handle, 1); if (!dev) { return -ENOENT; } return MPTSAS_CONFIG_PACK_EXT(1, MPI_CONFIG_EXTPAGETYPE_SAS_DEVICE, 0x00, "*lq*lwbb*s20", dev->wwn, dev_handle, i, 0); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,909
size_t mptsas_config_sas_device_2(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, dev_handle, 2); if (!dev) { return -ENOENT; } return MPTSAS_CONFIG_PACK_EXT(2, MPI_CONFIG_EXTPAGETYPE_SAS_DEVICE, 0x01, "ql", dev->wwn, 0); }
DoS
0
size_t mptsas_config_sas_device_2(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, dev_handle, 2); if (!dev) { return -ENOENT; } return MPTSAS_CONFIG_PACK_EXT(2, MPI_CONFIG_EXTPAGETYPE_SAS_DEVICE, 0x01, "ql", dev->wwn, 0); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,910
size_t mptsas_config_sas_io_unit_0(MPTSASState *s, uint8_t **data, int address) { size_t size = MPTSAS_CONFIG_PACK_EXT(0, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x04, "*w*wb*b*w" repl(MPTSAS_NUM_PORTS, "*s16"), MPTSAS_NUM_PORTS); if (data) { size_t ofs = size - MPTSAS_NUM_PORTS * MPTSAS_CONFIG_SAS_IO_UNIT_0_SIZE; int i; for (i = 0; i < MPTSAS_NUM_PORTS; i++) { int phy_handle, dev_handle; SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); fill(*data + ofs, MPTSAS_CONFIG_SAS_IO_UNIT_0_SIZE, "bbbblwwl", i, 0, 0, (dev ? MPI_SAS_IOUNIT0_RATE_3_0 : MPI_SAS_IOUNIT0_RATE_FAILED_SPEED_NEGOTIATION), (dev ? MPI_SAS_DEVICE_INFO_END_DEVICE | MPI_SAS_DEVICE_INFO_SSP_TARGET : MPI_SAS_DEVICE_INFO_NO_DEVICE), dev_handle, dev_handle, 0); ofs += MPTSAS_CONFIG_SAS_IO_UNIT_0_SIZE; } assert(ofs == size); } return size; }
DoS
0
size_t mptsas_config_sas_io_unit_0(MPTSASState *s, uint8_t **data, int address) { size_t size = MPTSAS_CONFIG_PACK_EXT(0, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x04, "*w*wb*b*w" repl(MPTSAS_NUM_PORTS, "*s16"), MPTSAS_NUM_PORTS); if (data) { size_t ofs = size - MPTSAS_NUM_PORTS * MPTSAS_CONFIG_SAS_IO_UNIT_0_SIZE; int i; for (i = 0; i < MPTSAS_NUM_PORTS; i++) { int phy_handle, dev_handle; SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); fill(*data + ofs, MPTSAS_CONFIG_SAS_IO_UNIT_0_SIZE, "bbbblwwl", i, 0, 0, (dev ? MPI_SAS_IOUNIT0_RATE_3_0 : MPI_SAS_IOUNIT0_RATE_FAILED_SPEED_NEGOTIATION), (dev ? MPI_SAS_DEVICE_INFO_END_DEVICE | MPI_SAS_DEVICE_INFO_SSP_TARGET : MPI_SAS_DEVICE_INFO_NO_DEVICE), dev_handle, dev_handle, 0); ofs += MPTSAS_CONFIG_SAS_IO_UNIT_0_SIZE; } assert(ofs == size); } return size; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,911
size_t mptsas_config_sas_io_unit_2(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(2, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*b*b*w*w*w*b*b*w"); }
DoS
0
size_t mptsas_config_sas_io_unit_2(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(2, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*b*b*w*w*w*b*b*w"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,912
size_t mptsas_config_sas_io_unit_3(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(3, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*l*l*l*l*l*l*l*l*l"); }
DoS
0
size_t mptsas_config_sas_io_unit_3(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(3, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*l*l*l*l*l*l*l*l*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,913
static int mptsas_device_addr_get(MPTSASState *s, int address) { uint32_t handle, i; uint32_t form = address >> MPI_SAS_PHY_PGAD_FORM_SHIFT; if (form == MPI_SAS_DEVICE_PGAD_FORM_GET_NEXT_HANDLE) { handle = address & MPI_SAS_DEVICE_PGAD_GNH_HANDLE_MASK; do { if (handle == 65535) { handle = MPTSAS_NUM_PORTS + 1; } else { ++handle; } i = handle - 1 - MPTSAS_NUM_PORTS; } while (i < MPTSAS_NUM_PORTS && !scsi_device_find(&s->bus, 0, i, 0)); } else if (form == MPI_SAS_DEVICE_PGAD_FORM_BUS_TARGET_ID) { if (address & MPI_SAS_DEVICE_PGAD_BT_BUS_MASK) { return -EINVAL; } i = address & MPI_SAS_DEVICE_PGAD_BT_TID_MASK; } else if (form == MPI_SAS_DEVICE_PGAD_FORM_HANDLE) { handle = address & MPI_SAS_DEVICE_PGAD_H_HANDLE_MASK; i = handle - 1 - MPTSAS_NUM_PORTS; } else { return -EINVAL; } if (i >= MPTSAS_NUM_PORTS) { return -EINVAL; } return i; }
DoS
0
static int mptsas_device_addr_get(MPTSASState *s, int address) { uint32_t handle, i; uint32_t form = address >> MPI_SAS_PHY_PGAD_FORM_SHIFT; if (form == MPI_SAS_DEVICE_PGAD_FORM_GET_NEXT_HANDLE) { handle = address & MPI_SAS_DEVICE_PGAD_GNH_HANDLE_MASK; do { if (handle == 65535) { handle = MPTSAS_NUM_PORTS + 1; } else { ++handle; } i = handle - 1 - MPTSAS_NUM_PORTS; } while (i < MPTSAS_NUM_PORTS && !scsi_device_find(&s->bus, 0, i, 0)); } else if (form == MPI_SAS_DEVICE_PGAD_FORM_BUS_TARGET_ID) { if (address & MPI_SAS_DEVICE_PGAD_BT_BUS_MASK) { return -EINVAL; } i = address & MPI_SAS_DEVICE_PGAD_BT_TID_MASK; } else if (form == MPI_SAS_DEVICE_PGAD_FORM_HANDLE) { handle = address & MPI_SAS_DEVICE_PGAD_H_HANDLE_MASK; i = handle - 1 - MPTSAS_NUM_PORTS; } else { return -EINVAL; } if (i >= MPTSAS_NUM_PORTS) { return -EINVAL; } return i; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,914
static const MPTSASConfigPage *mptsas_find_config_page(int type, int number) { const MPTSASConfigPage *page; int i; for (i = 0; i < ARRAY_SIZE(mptsas_config_pages); i++) { page = &mptsas_config_pages[i]; if (page->type == type && page->number == number) { return page; } } return NULL; }
DoS
0
static const MPTSASConfigPage *mptsas_find_config_page(int type, int number) { const MPTSASConfigPage *page; int i; for (i = 0; i < ARRAY_SIZE(mptsas_config_pages); i++) { page = &mptsas_config_pages[i]; if (page->type == type && page->number == number) { return page; } } return NULL; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,915
static int mptsas_phy_addr_get(MPTSASState *s, int address) { int i; if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 0) { i = address & 255; } else if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 1) { i = address & 65535; } else { return -EINVAL; } if (i >= MPTSAS_NUM_PORTS) { return -EINVAL; } return i; }
DoS
0
static int mptsas_phy_addr_get(MPTSASState *s, int address) { int i; if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 0) { i = address & 255; } else if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 1) { i = address & 65535; } else { return -EINVAL; } if (i >= MPTSAS_NUM_PORTS) { return -EINVAL; } return i; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,916
static SCSIDevice *mptsas_phy_get_device(MPTSASState *s, int i, int *phy_handle, int *dev_handle) { SCSIDevice *d = scsi_device_find(&s->bus, 0, i, 0); if (phy_handle) { *phy_handle = i + 1; } if (dev_handle) { *dev_handle = d ? i + 1 + MPTSAS_NUM_PORTS : 0; } return d; }
DoS
0
static SCSIDevice *mptsas_phy_get_device(MPTSASState *s, int i, int *phy_handle, int *dev_handle) { SCSIDevice *d = scsi_device_find(&s->bus, 0, i, 0); if (phy_handle) { *phy_handle = i + 1; } if (dev_handle) { *dev_handle = d ? i + 1 + MPTSAS_NUM_PORTS : 0; } return d; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,917
void mptsas_process_config(MPTSASState *s, MPIMsgConfig *req) { PCIDevice *pci = PCI_DEVICE(s); MPIMsgConfigReply reply; const MPTSASConfigPage *page; size_t length; uint8_t type; uint8_t *data = NULL; uint32_t flags_and_length; uint32_t dmalen; uint64_t pa; mptsas_fix_config_endianness(req); QEMU_BUILD_BUG_ON(sizeof(s->doorbell_msg) < sizeof(*req)); QEMU_BUILD_BUG_ON(sizeof(s->doorbell_reply) < sizeof(reply)); /* Copy common bits from the request into the reply. */ memset(&reply, 0, sizeof(reply)); reply.Action = req->Action; reply.Function = req->Function; reply.MsgContext = req->MsgContext; reply.MsgLength = sizeof(reply) / 4; reply.PageType = req->PageType; reply.PageNumber = req->PageNumber; reply.PageLength = req->PageLength; reply.PageVersion = req->PageVersion; type = req->PageType & MPI_CONFIG_PAGETYPE_MASK; if (type == MPI_CONFIG_PAGETYPE_EXTENDED) { type = req->ExtPageType; if (type <= MPI_CONFIG_PAGETYPE_MASK) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_TYPE; goto out; } reply.ExtPageType = req->ExtPageType; } page = mptsas_find_config_page(type, req->PageNumber); switch(req->Action) { case MPI_CONFIG_ACTION_PAGE_DEFAULT: case MPI_CONFIG_ACTION_PAGE_HEADER: case MPI_CONFIG_ACTION_PAGE_READ_NVRAM: case MPI_CONFIG_ACTION_PAGE_READ_CURRENT: case MPI_CONFIG_ACTION_PAGE_READ_DEFAULT: case MPI_CONFIG_ACTION_PAGE_WRITE_CURRENT: case MPI_CONFIG_ACTION_PAGE_WRITE_NVRAM: break; default: reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_ACTION; goto out; } if (!page) { page = mptsas_find_config_page(type, 1); if (page) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; } else { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_TYPE; } goto out; } if (req->Action == MPI_CONFIG_ACTION_PAGE_DEFAULT || req->Action == MPI_CONFIG_ACTION_PAGE_HEADER) { length = page->mpt_config_build(s, NULL, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; goto out; } else { goto done; } } if (req->Action == MPI_CONFIG_ACTION_PAGE_WRITE_CURRENT || req->Action == MPI_CONFIG_ACTION_PAGE_WRITE_NVRAM) { length = page->mpt_config_build(s, NULL, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; } else { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_CANT_COMMIT; } goto out; } flags_and_length = req->PageBufferSGE.FlagsLength; dmalen = flags_and_length & MPI_SGE_LENGTH_MASK; if (dmalen == 0) { length = page->mpt_config_build(s, NULL, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; goto out; } else { goto done; } } if (flags_and_length & MPI_SGE_FLAGS_64_BIT_ADDRESSING) { pa = req->PageBufferSGE.u.Address64; } else { pa = req->PageBufferSGE.u.Address32; } /* Only read actions left. */ length = page->mpt_config_build(s, &data, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; goto out; } else { assert(data[2] == page->number); pci_dma_write(pci, pa, data, MIN(length, dmalen)); goto done; } abort(); done: if (type > MPI_CONFIG_PAGETYPE_MASK) { reply.ExtPageLength = length / 4; reply.ExtPageType = req->ExtPageType; } else { reply.PageLength = length / 4; } out: mptsas_fix_config_reply_endianness(&reply); mptsas_reply(s, (MPIDefaultReply *)&reply); g_free(data); }
DoS
0
void mptsas_process_config(MPTSASState *s, MPIMsgConfig *req) { PCIDevice *pci = PCI_DEVICE(s); MPIMsgConfigReply reply; const MPTSASConfigPage *page; size_t length; uint8_t type; uint8_t *data = NULL; uint32_t flags_and_length; uint32_t dmalen; uint64_t pa; mptsas_fix_config_endianness(req); QEMU_BUILD_BUG_ON(sizeof(s->doorbell_msg) < sizeof(*req)); QEMU_BUILD_BUG_ON(sizeof(s->doorbell_reply) < sizeof(reply)); /* Copy common bits from the request into the reply. */ memset(&reply, 0, sizeof(reply)); reply.Action = req->Action; reply.Function = req->Function; reply.MsgContext = req->MsgContext; reply.MsgLength = sizeof(reply) / 4; reply.PageType = req->PageType; reply.PageNumber = req->PageNumber; reply.PageLength = req->PageLength; reply.PageVersion = req->PageVersion; type = req->PageType & MPI_CONFIG_PAGETYPE_MASK; if (type == MPI_CONFIG_PAGETYPE_EXTENDED) { type = req->ExtPageType; if (type <= MPI_CONFIG_PAGETYPE_MASK) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_TYPE; goto out; } reply.ExtPageType = req->ExtPageType; } page = mptsas_find_config_page(type, req->PageNumber); switch(req->Action) { case MPI_CONFIG_ACTION_PAGE_DEFAULT: case MPI_CONFIG_ACTION_PAGE_HEADER: case MPI_CONFIG_ACTION_PAGE_READ_NVRAM: case MPI_CONFIG_ACTION_PAGE_READ_CURRENT: case MPI_CONFIG_ACTION_PAGE_READ_DEFAULT: case MPI_CONFIG_ACTION_PAGE_WRITE_CURRENT: case MPI_CONFIG_ACTION_PAGE_WRITE_NVRAM: break; default: reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_ACTION; goto out; } if (!page) { page = mptsas_find_config_page(type, 1); if (page) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; } else { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_TYPE; } goto out; } if (req->Action == MPI_CONFIG_ACTION_PAGE_DEFAULT || req->Action == MPI_CONFIG_ACTION_PAGE_HEADER) { length = page->mpt_config_build(s, NULL, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; goto out; } else { goto done; } } if (req->Action == MPI_CONFIG_ACTION_PAGE_WRITE_CURRENT || req->Action == MPI_CONFIG_ACTION_PAGE_WRITE_NVRAM) { length = page->mpt_config_build(s, NULL, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; } else { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_CANT_COMMIT; } goto out; } flags_and_length = req->PageBufferSGE.FlagsLength; dmalen = flags_and_length & MPI_SGE_LENGTH_MASK; if (dmalen == 0) { length = page->mpt_config_build(s, NULL, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; goto out; } else { goto done; } } if (flags_and_length & MPI_SGE_FLAGS_64_BIT_ADDRESSING) { pa = req->PageBufferSGE.u.Address64; } else { pa = req->PageBufferSGE.u.Address32; } /* Only read actions left. */ length = page->mpt_config_build(s, &data, req->PageAddress); if ((ssize_t)length < 0) { reply.IOCStatus = MPI_IOCSTATUS_CONFIG_INVALID_PAGE; goto out; } else { assert(data[2] == page->number); pci_dma_write(pci, pa, data, MIN(length, dmalen)); goto done; } abort(); done: if (type > MPI_CONFIG_PAGETYPE_MASK) { reply.ExtPageLength = length / 4; reply.ExtPageType = req->ExtPageType; } else { reply.PageLength = length / 4; } out: mptsas_fix_config_reply_endianness(&reply); mptsas_reply(s, (MPIDefaultReply *)&reply); g_free(data); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,918
static size_t vfill(uint8_t *data, size_t size, const char *fmt, va_list ap) { size_t ofs; PackValue val; const char *p; ofs = 0; p = fmt; while (*p) { memset(&val, 0, sizeof(val)); switch (*p) { case '*': p++; break; case 'b': case 'w': case 'l': val.ll = va_arg(ap, int); break; case 'q': val.ll = va_arg(ap, int64_t); break; case 's': val.str = va_arg(ap, void *); break; } switch (*p++) { case 'b': if (data) { stb_p(data + ofs, val.ll); } ofs++; break; case 'w': if (data) { stw_le_p(data + ofs, val.ll); } ofs += 2; break; case 'l': if (data) { stl_le_p(data + ofs, val.ll); } ofs += 4; break; case 'q': if (data) { stq_le_p(data + ofs, val.ll); } ofs += 8; break; case 's': { int cnt = atoi(p); if (data) { if (val.str) { strncpy((void *)data + ofs, val.str, cnt); } else { memset((void *)data + ofs, 0, cnt); } } ofs += cnt; break; } } } return ofs; }
DoS
0
static size_t vfill(uint8_t *data, size_t size, const char *fmt, va_list ap) { size_t ofs; PackValue val; const char *p; ofs = 0; p = fmt; while (*p) { memset(&val, 0, sizeof(val)); switch (*p) { case '*': p++; break; case 'b': case 'w': case 'l': val.ll = va_arg(ap, int); break; case 'q': val.ll = va_arg(ap, int64_t); break; case 's': val.str = va_arg(ap, void *); break; } switch (*p++) { case 'b': if (data) { stb_p(data + ofs, val.ll); } ofs++; break; case 'w': if (data) { stw_le_p(data + ofs, val.ll); } ofs += 2; break; case 'l': if (data) { stl_le_p(data + ofs, val.ll); } ofs += 4; break; case 'q': if (data) { stq_le_p(data + ofs, val.ll); } ofs += 8; break; case 's': { int cnt = atoi(p); if (data) { if (val.str) { strncpy((void *)data + ofs, val.str, cnt); } else { memset((void *)data + ofs, 0, cnt); } } ofs += cnt; break; } } } return ofs; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,919
static size_t vpack(uint8_t **p_data, const char *fmt, va_list ap1) { size_t size = 0; uint8_t *data = NULL; if (p_data) { va_list ap2; va_copy(ap2, ap1); size = vfill(NULL, 0, fmt, ap2); *p_data = data = g_malloc(size); va_end(ap2); } return vfill(data, size, fmt, ap1); }
DoS
0
static size_t vpack(uint8_t **p_data, const char *fmt, va_list ap1) { size_t size = 0; uint8_t *data = NULL; if (p_data) { va_list ap2; va_copy(ap2, ap1); size = vfill(NULL, 0, fmt, ap2); *p_data = data = g_malloc(size); va_end(ap2); } return vfill(data, size, fmt, ap1); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ size_t mptsas_config_ioc_0(MPTSASState *s, uint8_t **data, int address) return MPTSAS_CONFIG_PACK(0, MPI_CONFIG_PAGETYPE_IOC, 0x01, "*l*lwwb*b*b*blww", pcic->vendor_id, pcic->device_id, pcic->revision, - pcic->subsystem_vendor_id, + pcic->class_id, pcic->subsystem_vendor_id, pcic->subsystem_id); }
CWE-20
null
null
6,920
pvscsi_ring_pop_req_descr(PVSCSIRingInfo *mgr) { uint32_t ready_ptr = RS_GET_FIELD(mgr, reqProdIdx); if (ready_ptr != mgr->consumed_ptr) { uint32_t next_ready_ptr = mgr->consumed_ptr++ & mgr->txr_len_mask; uint32_t next_ready_page = next_ready_ptr / PVSCSI_MAX_NUM_REQ_ENTRIES_PER_PAGE; uint32_t inpage_idx = next_ready_ptr % PVSCSI_MAX_NUM_REQ_ENTRIES_PER_PAGE; return mgr->req_ring_pages_pa[next_ready_page] + inpage_idx * sizeof(PVSCSIRingReqDesc); } else { return 0; } }
DoS
0
pvscsi_ring_pop_req_descr(PVSCSIRingInfo *mgr) { uint32_t ready_ptr = RS_GET_FIELD(mgr, reqProdIdx); if (ready_ptr != mgr->consumed_ptr) { uint32_t next_ready_ptr = mgr->consumed_ptr++ & mgr->txr_len_mask; uint32_t next_ready_page = next_ready_ptr / PVSCSI_MAX_NUM_REQ_ENTRIES_PER_PAGE; uint32_t inpage_idx = next_ready_ptr % PVSCSI_MAX_NUM_REQ_ENTRIES_PER_PAGE; return mgr->req_ring_pages_pa[next_ready_page] + inpage_idx * sizeof(PVSCSIRingReqDesc); } else { return 0; } }
@@ -40,6 +40,8 @@ #define PVSCSI_MAX_DEVS (64) #define PVSCSI_MSIX_NUM_VECTORS (1) +#define PVSCSI_MAX_SG_ELEM 2048 + #define PVSCSI_MAX_CMD_DATA_WORDS \ (sizeof(PVSCSICmdDescSetupRings)/sizeof(uint32_t)) @@ -628,17 +630,16 @@ pvscsi_queue_pending_descriptor(PVSCSIState *s, SCSIDevice **d, static void pvscsi_convert_sglist(PVSCSIRequest *r) { - int chunk_size; + uint32_t chunk_size, elmcnt = 0; uint64_t data_length = r->req.dataLen; PVSCSISGState sg = r->sg; - while (data_length) { - while (!sg.resid) { + while (data_length && elmcnt < PVSCSI_MAX_SG_ELEM) { + while (!sg.resid && elmcnt++ < PVSCSI_MAX_SG_ELEM) { pvscsi_get_next_sg_elem(&sg); trace_pvscsi_convert_sglist(r->req.context, r->sg.dataAddr, r->sg.resid); } - assert(data_length > 0); - chunk_size = MIN((unsigned) data_length, sg.resid); + chunk_size = MIN(data_length, sg.resid); if (chunk_size) { qemu_sglist_add(&r->sgl, sg.dataAddr, chunk_size); }
CWE-399
null
null
6,921
append_dir_structure (const struct url *u, struct growable *dest) { char *pathel, *next; int cut = opt.cut_dirs; /* Go through the path components, de-URL-quote them, and quote them (if necessary) as file names. */ pathel = u->path; for (; (next = strchr (pathel, '/')) != NULL; pathel = next + 1) { if (cut-- > 0) continue; if (pathel == next) /* Ignore empty pathels. */ continue; if (dest->tail) append_char ('/', dest); append_uri_pathel (pathel, next, true, dest); } }
null
0
append_dir_structure (const struct url *u, struct growable *dest) { char *pathel, *next; int cut = opt.cut_dirs; /* Go through the path components, de-URL-quote them, and quote them (if necessary) as file names. */ pathel = u->path; for (; (next = strchr (pathel, '/')) != NULL; pathel = next + 1) { if (cut-- > 0) continue; if (pathel == next) /* Ignore empty pathels. */ continue; if (dest->tail) append_char ('/', dest); append_uri_pathel (pathel, next, true, dest); } }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,922
append_null (struct growable *dest) { GROW (dest, 1); *TAIL (dest) = 0; }
null
0
append_null (struct growable *dest) { GROW (dest, 1); *TAIL (dest) = 0; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,923
append_string (const char *str, struct growable *dest) { int l = strlen (str); if (l) { GROW (dest, l); memcpy (TAIL (dest), str, l); TAIL_INCR (dest, l); } append_null (dest); }
null
0
append_string (const char *str, struct growable *dest) { int l = strlen (str); if (l) { GROW (dest, l); memcpy (TAIL (dest), str, l); TAIL_INCR (dest, l); } append_null (dest); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,924
append_uri_pathel (const char *b, const char *e, bool escaped, struct growable *dest) { const char *p; int quoted, outlen; int mask; if (opt.restrict_files_os == restrict_unix) mask = filechr_not_unix; else if (opt.restrict_files_os == restrict_vms) mask = filechr_not_vms; else mask = filechr_not_windows; if (opt.restrict_files_ctrl) mask |= filechr_control; /* Copy [b, e) to PATHEL and URL-unescape it. */ if (escaped) { char *unescaped; BOUNDED_TO_ALLOCA (b, e, unescaped); url_unescape (unescaped); b = unescaped; e = unescaped + strlen (unescaped); } /* Defang ".." when found as component of path. Remember that path comes from the URL and might contain malicious input. */ if (e - b == 2 && b[0] == '.' && b[1] == '.') { b = "%2E%2E"; e = b + 6; } /* Walk the PATHEL string and check how many characters we'll need to quote. */ quoted = 0; for (p = b; p < e; p++) if (FILE_CHAR_TEST (*p, mask)) ++quoted; /* Calculate the length of the output string. e-b is the input string length. Each quoted char introduces two additional characters in the string, hence 2*quoted. */ outlen = (e - b) + (2 * quoted); GROW (dest, outlen); if (!quoted) { /* If there's nothing to quote, we can simply append the string without processing it again. */ memcpy (TAIL (dest), b, outlen); } else { char *q = TAIL (dest); for (p = b; p < e; p++) { if (!FILE_CHAR_TEST (*p, mask)) *q++ = *p; else { unsigned char ch = *p; *q++ = '%'; *q++ = XNUM_TO_DIGIT (ch >> 4); *q++ = XNUM_TO_DIGIT (ch & 0xf); } } assert (q - TAIL (dest) == outlen); } /* Perform inline case transformation if required. */ if (opt.restrict_files_case == restrict_lowercase || opt.restrict_files_case == restrict_uppercase) { char *q; for (q = TAIL (dest); q < TAIL (dest) + outlen; ++q) { if (opt.restrict_files_case == restrict_lowercase) *q = c_tolower (*q); else *q = c_toupper (*q); } } TAIL_INCR (dest, outlen); append_null (dest); }
null
0
append_uri_pathel (const char *b, const char *e, bool escaped, struct growable *dest) { const char *p; int quoted, outlen; int mask; if (opt.restrict_files_os == restrict_unix) mask = filechr_not_unix; else if (opt.restrict_files_os == restrict_vms) mask = filechr_not_vms; else mask = filechr_not_windows; if (opt.restrict_files_ctrl) mask |= filechr_control; /* Copy [b, e) to PATHEL and URL-unescape it. */ if (escaped) { char *unescaped; BOUNDED_TO_ALLOCA (b, e, unescaped); url_unescape (unescaped); b = unescaped; e = unescaped + strlen (unescaped); } /* Defang ".." when found as component of path. Remember that path comes from the URL and might contain malicious input. */ if (e - b == 2 && b[0] == '.' && b[1] == '.') { b = "%2E%2E"; e = b + 6; } /* Walk the PATHEL string and check how many characters we'll need to quote. */ quoted = 0; for (p = b; p < e; p++) if (FILE_CHAR_TEST (*p, mask)) ++quoted; /* Calculate the length of the output string. e-b is the input string length. Each quoted char introduces two additional characters in the string, hence 2*quoted. */ outlen = (e - b) + (2 * quoted); GROW (dest, outlen); if (!quoted) { /* If there's nothing to quote, we can simply append the string without processing it again. */ memcpy (TAIL (dest), b, outlen); } else { char *q = TAIL (dest); for (p = b; p < e; p++) { if (!FILE_CHAR_TEST (*p, mask)) *q++ = *p; else { unsigned char ch = *p; *q++ = '%'; *q++ = XNUM_TO_DIGIT (ch >> 4); *q++ = XNUM_TO_DIGIT (ch & 0xf); } } assert (q - TAIL (dest) == outlen); } /* Perform inline case transformation if required. */ if (opt.restrict_files_case == restrict_lowercase || opt.restrict_files_case == restrict_uppercase) { char *q; for (q = TAIL (dest); q < TAIL (dest) + outlen; ++q) { if (opt.restrict_files_case == restrict_lowercase) *q = c_tolower (*q); else *q = c_toupper (*q); } } TAIL_INCR (dest, outlen); append_null (dest); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,925
are_urls_equal (const char *u1, const char *u2) { const char *p, *q; int pp, qq; char ch1, ch2; assert(u1 && u2); p = u1; q = u2; while (*p && *q && (pp = getchar_from_escaped_string (p, &ch1)) && (qq = getchar_from_escaped_string (q, &ch2)) && (c_tolower(ch1) == c_tolower(ch2))) { p += pp; q += qq; } return (*p == 0 && *q == 0 ? true : false); }
null
0
are_urls_equal (const char *u1, const char *u2) { const char *p, *q; int pp, qq; char ch1, ch2; assert(u1 && u2); p = u1; q = u2; while (*p && *q && (pp = getchar_from_escaped_string (p, &ch1)) && (qq = getchar_from_escaped_string (q, &ch2)) && (c_tolower(ch1) == c_tolower(ch2))) { p += pp; q += qq; } return (*p == 0 && *q == 0 ? true : false); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,926
char_needs_escaping (const char *p) { if (*p == '%') { if (c_isxdigit (*(p + 1)) && c_isxdigit (*(p + 2))) return false; else /* Garbled %.. sequence: encode `%'. */ return true; } else if (URL_UNSAFE_CHAR (*p) && !URL_RESERVED_CHAR (*p)) return true; else return false; }
null
0
char_needs_escaping (const char *p) { if (*p == '%') { if (c_isxdigit (*(p + 1)) && c_isxdigit (*(p + 2))) return false; else /* Garbled %.. sequence: encode `%'. */ return true; } else if (URL_UNSAFE_CHAR (*p) && !URL_RESERVED_CHAR (*p)) return true; else return false; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,927
convert_fname (char *fname) { char *converted_fname = fname; const char *from_encoding = opt.encoding_remote; const char *to_encoding = opt.locale; iconv_t cd; size_t len, done, inlen, outlen; char *s; const char *orig_fname = fname; /* Defaults for remote and local encodings. */ if (!from_encoding) from_encoding = "UTF-8"; if (!to_encoding) to_encoding = nl_langinfo (CODESET); cd = iconv_open (to_encoding, from_encoding); if (cd == (iconv_t)(-1)) logprintf (LOG_VERBOSE, _("Conversion from %s to %s isn't supported\n"), quote (from_encoding), quote (to_encoding)); else { inlen = strlen (fname); len = outlen = inlen * 2; converted_fname = s = xmalloc (outlen + 1); done = 0; for (;;) { if (iconv (cd, (ICONV_CONST char **) &fname, &inlen, &s, &outlen) != (size_t)(-1) && iconv (cd, NULL, NULL, &s, &outlen) != (size_t)(-1)) { *(converted_fname + len - outlen - done) = '\0'; iconv_close(cd); DEBUGP (("Converted file name '%s' (%s) -> '%s' (%s)\n", orig_fname, from_encoding, converted_fname, to_encoding)); xfree (orig_fname); return converted_fname; } /* Incomplete or invalid multibyte sequence */ if (errno == EINVAL || errno == EILSEQ) { logprintf (LOG_VERBOSE, _("Incomplete or invalid multibyte sequence encountered\n")); xfree (converted_fname); converted_fname = (char *)orig_fname; break; } else if (errno == E2BIG) /* Output buffer full */ { done = len; len = outlen = done + inlen * 2; converted_fname = xrealloc (converted_fname, outlen + 1); s = converted_fname + done; } else /* Weird, we got an unspecified error */ { logprintf (LOG_VERBOSE, _("Unhandled errno %d\n"), errno); xfree (converted_fname); converted_fname = (char *)orig_fname; break; } } DEBUGP (("Failed to convert file name '%s' (%s) -> '?' (%s)\n", orig_fname, from_encoding, to_encoding)); } iconv_close(cd); return converted_fname; }
null
0
convert_fname (char *fname) { char *converted_fname = fname; const char *from_encoding = opt.encoding_remote; const char *to_encoding = opt.locale; iconv_t cd; size_t len, done, inlen, outlen; char *s; const char *orig_fname = fname; /* Defaults for remote and local encodings. */ if (!from_encoding) from_encoding = "UTF-8"; if (!to_encoding) to_encoding = nl_langinfo (CODESET); cd = iconv_open (to_encoding, from_encoding); if (cd == (iconv_t)(-1)) logprintf (LOG_VERBOSE, _("Conversion from %s to %s isn't supported\n"), quote (from_encoding), quote (to_encoding)); else { inlen = strlen (fname); len = outlen = inlen * 2; converted_fname = s = xmalloc (outlen + 1); done = 0; for (;;) { if (iconv (cd, (ICONV_CONST char **) &fname, &inlen, &s, &outlen) != (size_t)(-1) && iconv (cd, NULL, NULL, &s, &outlen) != (size_t)(-1)) { *(converted_fname + len - outlen - done) = '\0'; iconv_close(cd); DEBUGP (("Converted file name '%s' (%s) -> '%s' (%s)\n", orig_fname, from_encoding, converted_fname, to_encoding)); xfree (orig_fname); return converted_fname; } /* Incomplete or invalid multibyte sequence */ if (errno == EINVAL || errno == EILSEQ) { logprintf (LOG_VERBOSE, _("Incomplete or invalid multibyte sequence encountered\n")); xfree (converted_fname); converted_fname = (char *)orig_fname; break; } else if (errno == E2BIG) /* Output buffer full */ { done = len; len = outlen = done + inlen * 2; converted_fname = xrealloc (converted_fname, outlen + 1); s = converted_fname + done; } else /* Weird, we got an unspecified error */ { logprintf (LOG_VERBOSE, _("Unhandled errno %d\n"), errno); xfree (converted_fname); converted_fname = (char *)orig_fname; break; } } DEBUGP (("Failed to convert file name '%s' (%s) -> '?' (%s)\n", orig_fname, from_encoding, to_encoding)); } iconv_close(cd); return converted_fname; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,928
full_path_write (const struct url *url, char *where) { #define FROB(el, chr) do { \ char *f_el = url->el; \ if (f_el) { \ int l = strlen (f_el); \ *where++ = chr; \ memcpy (where, f_el, l); \ where += l; \ } \ } while (0) FROB (path, '/'); FROB (params, ';'); FROB (query, '?'); #undef FROB }
null
0
full_path_write (const struct url *url, char *where) { #define FROB(el, chr) do { \ char *f_el = url->el; \ if (f_el) { \ int l = strlen (f_el); \ *where++ = chr; \ memcpy (where, f_el, l); \ where += l; \ } \ } while (0) FROB (path, '/'); FROB (params, ';'); FROB (query, '?'); #undef FROB }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,929
getchar_from_escaped_string (const char *str, char *c) { const char *p = str; assert (str && *str); assert (c); if (p[0] == '%') { if (!c_isxdigit(p[1]) || !c_isxdigit(p[2])) { *c = '%'; return 1; } else { if (p[2] == 0) return 0; /* error: invalid string */ *c = X2DIGITS_TO_NUM (p[1], p[2]); if (URL_RESERVED_CHAR(*c)) { *c = '%'; return 1; } else return 3; } } else { *c = p[0]; } return 1; }
null
0
getchar_from_escaped_string (const char *str, char *c) { const char *p = str; assert (str && *str); assert (c); if (p[0] == '%') { if (!c_isxdigit(p[1]) || !c_isxdigit(p[2])) { *c = '%'; return 1; } else { if (p[2] == 0) return 0; /* error: invalid string */ *c = X2DIGITS_TO_NUM (p[1], p[2]); if (URL_RESERVED_CHAR(*c)) { *c = '%'; return 1; } else return 3; } } else { *c = p[0]; } return 1; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,930
init_seps (enum url_scheme scheme) { static char seps[8] = ":/"; char *p = seps + 2; int flags = supported_schemes[scheme].flags; if (flags & scm_has_params) *p++ = ';'; if (flags & scm_has_query) *p++ = '?'; if (flags & scm_has_fragment) *p++ = '#'; *p = '\0'; return seps; }
null
0
init_seps (enum url_scheme scheme) { static char seps[8] = ":/"; char *p = seps + 2; int flags = supported_schemes[scheme].flags; if (flags & scm_has_params) *p++ = ';'; if (flags & scm_has_query) *p++ = '?'; if (flags & scm_has_fragment) *p++ = '#'; *p = '\0'; return seps; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,931
lowercase_str (char *str) { bool changed = false; for (; *str; str++) if (c_isupper (*str)) { changed = true; *str = c_tolower (*str); } return changed; }
null
0
lowercase_str (char *str) { bool changed = false; for (; *str; str++) if (c_isupper (*str)) { changed = true; *str = c_tolower (*str); } return changed; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,932
mkalldirs (const char *path) { const char *p; char *t; struct stat st; int res; p = path + strlen (path); for (; *p != '/' && p != path; p--) ; /* Don't create if it's just a file. */ if ((p == path) && (*p != '/')) return 0; t = strdupdelim (path, p); /* Check whether the directory exists. */ if ((stat (t, &st) == 0)) { if (S_ISDIR (st.st_mode)) { xfree (t); return 0; } else { /* If the dir exists as a file name, remove it first. This is *only* for Wget to work with buggy old CERN http servers. Here is the scenario: When Wget tries to retrieve a directory without a slash, e.g. http://foo/bar (bar being a directory), CERN server will not redirect it too http://foo/bar/ -- it will generate a directory listing containing links to bar/file1, bar/file2, etc. Wget will lose because it saves this HTML listing to a file `bar', so it cannot create the directory. To work around this, if the file of the same name exists, we just remove it and create the directory anyway. */ DEBUGP (("Removing %s because of directory danger!\n", t)); if (unlink (t)) logprintf (LOG_NOTQUIET, "Failed to unlink %s (%d): %s\n", t, errno, strerror(errno)); } } res = make_directory (t); if (res != 0) logprintf (LOG_NOTQUIET, "%s: %s\n", t, strerror (errno)); xfree (t); return res; }
null
0
mkalldirs (const char *path) { const char *p; char *t; struct stat st; int res; p = path + strlen (path); for (; *p != '/' && p != path; p--) ; /* Don't create if it's just a file. */ if ((p == path) && (*p != '/')) return 0; t = strdupdelim (path, p); /* Check whether the directory exists. */ if ((stat (t, &st) == 0)) { if (S_ISDIR (st.st_mode)) { xfree (t); return 0; } else { /* If the dir exists as a file name, remove it first. This is *only* for Wget to work with buggy old CERN http servers. Here is the scenario: When Wget tries to retrieve a directory without a slash, e.g. http://foo/bar (bar being a directory), CERN server will not redirect it too http://foo/bar/ -- it will generate a directory listing containing links to bar/file1, bar/file2, etc. Wget will lose because it saves this HTML listing to a file `bar', so it cannot create the directory. To work around this, if the file of the same name exists, we just remove it and create the directory anyway. */ DEBUGP (("Removing %s because of directory danger!\n", t)); if (unlink (t)) logprintf (LOG_NOTQUIET, "Failed to unlink %s (%d): %s\n", t, errno, strerror(errno)); } } res = make_directory (t); if (res != 0) logprintf (LOG_NOTQUIET, "%s: %s\n", t, strerror (errno)); xfree (t); return res; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,933
path_simplify (enum url_scheme scheme, char *path) { char *h = path; /* hare */ char *t = path; /* tortoise */ char *beg = path; char *end = strchr (path, '\0'); while (h < end) { /* Hare should be at the beginning of a path element. */ if (h[0] == '.' && (h[1] == '/' || h[1] == '\0')) { /* Ignore "./". */ h += 2; } else if (h[0] == '.' && h[1] == '.' && (h[2] == '/' || h[2] == '\0')) { /* Handle "../" by retreating the tortoise by one path element -- but not past beginning. */ if (t > beg) { /* Move backwards until T hits the beginning of the previous path element or the beginning of path. */ for (--t; t > beg && t[-1] != '/'; t--) ; } else if (scheme == SCHEME_FTP #ifdef HAVE_SSL || scheme == SCHEME_FTPS #endif ) { /* If we're at the beginning, copy the "../" literally and move the beginning so a later ".." doesn't remove it. This violates RFC 3986; but we do it for FTP anyway because there is otherwise no way to get at a parent directory, when the FTP server drops us in a non-root directory (which is not uncommon). */ beg = t + 3; goto regular; } h += 3; } else { regular: /* A regular path element. If H hasn't advanced past T, simply skip to the next path element. Otherwise, copy the path element until the next slash. */ if (t == h) { /* Skip the path element, including the slash. */ while (h < end && *h != '/') t++, h++; if (h < end) t++, h++; } else { /* Copy the path element, including the final slash. */ while (h < end && *h != '/') *t++ = *h++; if (h < end) *t++ = *h++; } } } if (t != h) *t = '\0'; return t != h; }
null
0
path_simplify (enum url_scheme scheme, char *path) { char *h = path; /* hare */ char *t = path; /* tortoise */ char *beg = path; char *end = strchr (path, '\0'); while (h < end) { /* Hare should be at the beginning of a path element. */ if (h[0] == '.' && (h[1] == '/' || h[1] == '\0')) { /* Ignore "./". */ h += 2; } else if (h[0] == '.' && h[1] == '.' && (h[2] == '/' || h[2] == '\0')) { /* Handle "../" by retreating the tortoise by one path element -- but not past beginning. */ if (t > beg) { /* Move backwards until T hits the beginning of the previous path element or the beginning of path. */ for (--t; t > beg && t[-1] != '/'; t--) ; } else if (scheme == SCHEME_FTP #ifdef HAVE_SSL || scheme == SCHEME_FTPS #endif ) { /* If we're at the beginning, copy the "../" literally and move the beginning so a later ".." doesn't remove it. This violates RFC 3986; but we do it for FTP anyway because there is otherwise no way to get at a parent directory, when the FTP server drops us in a non-root directory (which is not uncommon). */ beg = t + 3; goto regular; } h += 3; } else { regular: /* A regular path element. If H hasn't advanced past T, simply skip to the next path element. Otherwise, copy the path element until the next slash. */ if (t == h) { /* Skip the path element, including the slash. */ while (h < end && *h != '/') t++, h++; if (h < end) t++, h++; } else { /* Copy the path element, including the final slash. */ while (h < end && *h != '/') *t++ = *h++; if (h < end) *t++ = *h++; } } } if (t != h) *t = '\0'; return t != h; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,934
ps (char *path) { char *copy = xstrdup (path); path_simplify (copy); return copy; }
null
0
ps (char *path) { char *copy = xstrdup (path); path_simplify (copy); return copy; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,935
rewrite_shorthand_url (const char *url) { const char *p; char *ret; if (url_scheme (url) != SCHEME_INVALID) return NULL; /* Look for a ':' or '/'. The former signifies NcFTP syntax, the latter Netscape. */ p = strpbrk (url, ":/"); if (p == url) return NULL; /* If we're looking at "://", it means the URL uses a scheme we don't support, which may include "https" when compiled without SSL support. Don't bogusly rewrite such URLs. */ if (p && p[0] == ':' && p[1] == '/' && p[2] == '/') return NULL; if (p && *p == ':') { /* Colon indicates ftp, as in foo.bar.com:path. Check for special case of http port number ("localhost:10000"). */ int digits = strspn (p + 1, "0123456789"); if (digits && (p[1 + digits] == '/' || p[1 + digits] == '\0')) goto http; /* Turn "foo.bar.com:path" to "ftp://foo.bar.com/path". */ if ((ret = aprintf ("ftp://%s", url)) != NULL) ret[6 + (p - url)] = '/'; } else { http: /* Just prepend "http://" to URL. */ ret = aprintf ("http://%s", url); } return ret; }
null
0
rewrite_shorthand_url (const char *url) { const char *p; char *ret; if (url_scheme (url) != SCHEME_INVALID) return NULL; /* Look for a ':' or '/'. The former signifies NcFTP syntax, the latter Netscape. */ p = strpbrk (url, ":/"); if (p == url) return NULL; /* If we're looking at "://", it means the URL uses a scheme we don't support, which may include "https" when compiled without SSL support. Don't bogusly rewrite such URLs. */ if (p && p[0] == ':' && p[1] == '/' && p[2] == '/') return NULL; if (p && *p == ':') { /* Colon indicates ftp, as in foo.bar.com:path. Check for special case of http port number ("localhost:10000"). */ int digits = strspn (p + 1, "0123456789"); if (digits && (p[1 + digits] == '/' || p[1 + digits] == '\0')) goto http; /* Turn "foo.bar.com:path" to "ftp://foo.bar.com/path". */ if ((ret = aprintf ("ftp://%s", url)) != NULL) ret[6 + (p - url)] = '/'; } else { http: /* Just prepend "http://" to URL. */ ret = aprintf ("http://%s", url); } return ret; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,936
scheme_disable (enum url_scheme scheme) { supported_schemes[scheme].flags |= scm_disabled; }
null
0
scheme_disable (enum url_scheme scheme) { supported_schemes[scheme].flags |= scm_disabled; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,937
scheme_leading_string (enum url_scheme scheme) { return supported_schemes[scheme].leading_string; }
null
0
scheme_leading_string (enum url_scheme scheme) { return supported_schemes[scheme].leading_string; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,938
schemes_are_similar_p (enum url_scheme a, enum url_scheme b) { if (a == b) return true; #ifdef HAVE_SSL if ((a == SCHEME_HTTP && b == SCHEME_HTTPS) || (a == SCHEME_HTTPS && b == SCHEME_HTTP)) return true; #endif return false; }
null
0
schemes_are_similar_p (enum url_scheme a, enum url_scheme b) { if (a == b) return true; #ifdef HAVE_SSL if ((a == SCHEME_HTTP && b == SCHEME_HTTPS) || (a == SCHEME_HTTPS && b == SCHEME_HTTP)) return true; #endif return false; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,939
split_path (const char *path, char **dir, char **file) { char *last_slash = strrchr (path, '/'); if (!last_slash) { *dir = xstrdup (""); *file = xstrdup (path); } else { *dir = strdupdelim (path, last_slash); *file = xstrdup (last_slash + 1); } url_unescape (*dir); url_unescape (*file); }
null
0
split_path (const char *path, char **dir, char **file) { char *last_slash = strrchr (path, '/'); if (!last_slash) { *dir = xstrdup (""); *file = xstrdup (path); } else { *dir = strdupdelim (path, last_slash); *file = xstrdup (last_slash + 1); } url_unescape (*dir); url_unescape (*file); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,940
strpbrk_or_eos (const char *s, const char *accept) { char *p = strpbrk (s, accept); if (!p) p = strchr (s, '\0'); return p; }
null
0
strpbrk_or_eos (const char *s, const char *accept) { char *p = strpbrk (s, accept); if (!p) p = strchr (s, '\0'); return p; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,941
sync_path (struct url *u) { char *newpath, *efile, *edir; xfree (u->path); /* u->dir and u->file are not escaped. URL-escape them before reassembling them into u->path. That way, if they contain separators like '?' or even if u->file contains slashes, the path will be correctly assembled. (u->file can contain slashes if the URL specifies it with %2f, or if an FTP server returns it.) */ edir = url_escape_dir (u->dir); efile = url_escape_1 (u->file, urlchr_unsafe | urlchr_reserved, 1); if (!*edir) newpath = xstrdup (efile); else { int dirlen = strlen (edir); int filelen = strlen (efile); /* Copy "DIR/FILE" to newpath. */ char *p = newpath = xmalloc (dirlen + 1 + filelen + 1); memcpy (p, edir, dirlen); p += dirlen; *p++ = '/'; memcpy (p, efile, filelen); p += filelen; *p = '\0'; } u->path = newpath; if (edir != u->dir) xfree (edir); if (efile != u->file) xfree (efile); /* Regenerate u->url as well. */ xfree (u->url); u->url = url_string (u, URL_AUTH_SHOW); }
null
0
sync_path (struct url *u) { char *newpath, *efile, *edir; xfree (u->path); /* u->dir and u->file are not escaped. URL-escape them before reassembling them into u->path. That way, if they contain separators like '?' or even if u->file contains slashes, the path will be correctly assembled. (u->file can contain slashes if the URL specifies it with %2f, or if an FTP server returns it.) */ edir = url_escape_dir (u->dir); efile = url_escape_1 (u->file, urlchr_unsafe | urlchr_reserved, 1); if (!*edir) newpath = xstrdup (efile); else { int dirlen = strlen (edir); int filelen = strlen (efile); /* Copy "DIR/FILE" to newpath. */ char *p = newpath = xmalloc (dirlen + 1 + filelen + 1); memcpy (p, edir, dirlen); p += dirlen; *p++ = '/'; memcpy (p, efile, filelen); p += filelen; *p = '\0'; } u->path = newpath; if (edir != u->dir) xfree (edir); if (efile != u->file) xfree (efile); /* Regenerate u->url as well. */ xfree (u->url); u->url = url_string (u, URL_AUTH_SHOW); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,942
test_append_uri_pathel(void) { unsigned i; static const struct { const char *original_url; const char *input; bool escaped; const char *expected_result; } test_array[] = { { "http://www.yoyodyne.com/path/", "somepage.html", false, "http://www.yoyodyne.com/path/somepage.html" }, }; for (i = 0; i < countof(test_array); ++i) { struct growable dest; const char *p = test_array[i].input; memset (&dest, 0, sizeof (dest)); append_string (test_array[i].original_url, &dest); append_uri_pathel (p, p + strlen(p), test_array[i].escaped, &dest); mu_assert ("test_append_uri_pathel: wrong result", strcmp (dest.base, test_array[i].expected_result) == 0); xfree (dest.base); } return NULL; }
null
0
test_append_uri_pathel(void) { unsigned i; static const struct { const char *original_url; const char *input; bool escaped; const char *expected_result; } test_array[] = { { "http://www.yoyodyne.com/path/", "somepage.html", false, "http://www.yoyodyne.com/path/somepage.html" }, }; for (i = 0; i < countof(test_array); ++i) { struct growable dest; const char *p = test_array[i].input; memset (&dest, 0, sizeof (dest)); append_string (test_array[i].original_url, &dest); append_uri_pathel (p, p + strlen(p), test_array[i].escaped, &dest); mu_assert ("test_append_uri_pathel: wrong result", strcmp (dest.base, test_array[i].expected_result) == 0); xfree (dest.base); } return NULL; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,943
test_path_simplify (void) { static const struct { const char *test, *result; enum url_scheme scheme; bool should_modify; } tests[] = { { "", "", SCHEME_HTTP, false }, { ".", "", SCHEME_HTTP, true }, { "./", "", SCHEME_HTTP, true }, { "..", "", SCHEME_HTTP, true }, { "../", "", SCHEME_HTTP, true }, { "..", "..", SCHEME_FTP, false }, { "../", "../", SCHEME_FTP, false }, { "foo", "foo", SCHEME_HTTP, false }, { "foo/bar", "foo/bar", SCHEME_HTTP, false }, { "foo///bar", "foo///bar", SCHEME_HTTP, false }, { "foo/.", "foo/", SCHEME_HTTP, true }, { "foo/./", "foo/", SCHEME_HTTP, true }, { "foo./", "foo./", SCHEME_HTTP, false }, { "foo/../bar", "bar", SCHEME_HTTP, true }, { "foo/../bar/", "bar/", SCHEME_HTTP, true }, { "foo/bar/..", "foo/", SCHEME_HTTP, true }, { "foo/bar/../x", "foo/x", SCHEME_HTTP, true }, { "foo/bar/../x/", "foo/x/", SCHEME_HTTP, true }, { "foo/..", "", SCHEME_HTTP, true }, { "foo/../..", "", SCHEME_HTTP, true }, { "foo/../../..", "", SCHEME_HTTP, true }, { "foo/../../bar/../../baz", "baz", SCHEME_HTTP, true }, { "foo/../..", "..", SCHEME_FTP, true }, { "foo/../../..", "../..", SCHEME_FTP, true }, { "foo/../../bar/../../baz", "../../baz", SCHEME_FTP, true }, { "a/b/../../c", "c", SCHEME_HTTP, true }, { "./a/../b", "b", SCHEME_HTTP, true } }; unsigned i; for (i = 0; i < countof (tests); i++) { const char *message; const char *test = tests[i].test; const char *expected_result = tests[i].result; enum url_scheme scheme = tests[i].scheme; bool expected_change = tests[i].should_modify; message = run_test (test, expected_result, scheme, expected_change); if (message) return message; } return NULL; }
null
0
test_path_simplify (void) { static const struct { const char *test, *result; enum url_scheme scheme; bool should_modify; } tests[] = { { "", "", SCHEME_HTTP, false }, { ".", "", SCHEME_HTTP, true }, { "./", "", SCHEME_HTTP, true }, { "..", "", SCHEME_HTTP, true }, { "../", "", SCHEME_HTTP, true }, { "..", "..", SCHEME_FTP, false }, { "../", "../", SCHEME_FTP, false }, { "foo", "foo", SCHEME_HTTP, false }, { "foo/bar", "foo/bar", SCHEME_HTTP, false }, { "foo///bar", "foo///bar", SCHEME_HTTP, false }, { "foo/.", "foo/", SCHEME_HTTP, true }, { "foo/./", "foo/", SCHEME_HTTP, true }, { "foo./", "foo./", SCHEME_HTTP, false }, { "foo/../bar", "bar", SCHEME_HTTP, true }, { "foo/../bar/", "bar/", SCHEME_HTTP, true }, { "foo/bar/..", "foo/", SCHEME_HTTP, true }, { "foo/bar/../x", "foo/x", SCHEME_HTTP, true }, { "foo/bar/../x/", "foo/x/", SCHEME_HTTP, true }, { "foo/..", "", SCHEME_HTTP, true }, { "foo/../..", "", SCHEME_HTTP, true }, { "foo/../../..", "", SCHEME_HTTP, true }, { "foo/../../bar/../../baz", "baz", SCHEME_HTTP, true }, { "foo/../..", "..", SCHEME_FTP, true }, { "foo/../../..", "../..", SCHEME_FTP, true }, { "foo/../../bar/../../baz", "../../baz", SCHEME_FTP, true }, { "a/b/../../c", "c", SCHEME_HTTP, true }, { "./a/../b", "b", SCHEME_HTTP, true } }; unsigned i; for (i = 0; i < countof (tests); i++) { const char *message; const char *test = tests[i].test; const char *expected_result = tests[i].result; enum url_scheme scheme = tests[i].scheme; bool expected_change = tests[i].should_modify; message = run_test (test, expected_result, scheme, expected_change); if (message) return message; } return NULL; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,944
unescape_single_char (char *str, char chr) { const char c1 = XNUM_TO_DIGIT (chr >> 4); const char c2 = XNUM_TO_DIGIT (chr & 0xf); char *h = str; /* hare */ char *t = str; /* tortoise */ for (; *h; h++, t++) { if (h[0] == '%' && h[1] == c1 && h[2] == c2) { *t = chr; h += 2; } else *t = *h; } *t = '\0'; }
null
0
unescape_single_char (char *str, char chr) { const char c1 = XNUM_TO_DIGIT (chr >> 4); const char c2 = XNUM_TO_DIGIT (chr & 0xf); char *h = str; /* hare */ char *t = str; /* tortoise */ for (; *h; h++, t++) { if (h[0] == '%' && h[1] == c1 && h[2] == c2) { *t = chr; h += 2; } else *t = *h; } *t = '\0'; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,945
uri_merge (const char *base, const char *link) { int linklength; const char *end; char *merge; if (url_has_scheme (link)) return xstrdup (link); /* We may not examine BASE past END. */ end = path_end (base); linklength = strlen (link); if (!*link) { /* Empty LINK points back to BASE, query string and all. */ return xstrdup (base); } else if (*link == '?') { /* LINK points to the same location, but changes the query string. Examples: */ /* uri_merge("path", "?new") -> "path?new" */ /* uri_merge("path?foo", "?new") -> "path?new" */ /* uri_merge("path?foo#bar", "?new") -> "path?new" */ /* uri_merge("path#foo", "?new") -> "path?new" */ int baselength = end - base; merge = xmalloc (baselength + linklength + 1); memcpy (merge, base, baselength); memcpy (merge + baselength, link, linklength); merge[baselength + linklength] = '\0'; } else if (*link == '#') { /* uri_merge("path", "#new") -> "path#new" */ /* uri_merge("path#foo", "#new") -> "path#new" */ /* uri_merge("path?foo", "#new") -> "path?foo#new" */ /* uri_merge("path?foo#bar", "#new") -> "path?foo#new" */ int baselength; const char *end1 = strchr (base, '#'); if (!end1) end1 = base + strlen (base); baselength = end1 - base; merge = xmalloc (baselength + linklength + 1); memcpy (merge, base, baselength); memcpy (merge + baselength, link, linklength); merge[baselength + linklength] = '\0'; } else if (*link == '/' && *(link + 1) == '/') { /* LINK begins with "//" and so is a net path: we need to replace everything after (and including) the double slash with LINK. */ /* uri_merge("foo", "//new/bar") -> "//new/bar" */ /* uri_merge("//old/foo", "//new/bar") -> "//new/bar" */ /* uri_merge("http://old/foo", "//new/bar") -> "http://new/bar" */ int span; const char *slash; const char *start_insert; /* Look for first slash. */ slash = memchr (base, '/', end - base); /* If found slash and it is a double slash, then replace from this point, else default to replacing from the beginning. */ if (slash && *(slash + 1) == '/') start_insert = slash; else start_insert = base; span = start_insert - base; merge = xmalloc (span + linklength + 1); if (span) memcpy (merge, base, span); memcpy (merge + span, link, linklength); merge[span + linklength] = '\0'; } else if (*link == '/') { /* LINK is an absolute path: we need to replace everything after (and including) the FIRST slash with LINK. So, if BASE is "http://host/whatever/foo/bar", and LINK is "/qux/xyzzy", our result should be "http://host/qux/xyzzy". */ int span; const char *slash; const char *start_insert = NULL; /* for gcc to shut up. */ const char *pos = base; bool seen_slash_slash = false; /* We're looking for the first slash, but want to ignore double slash. */ again: slash = memchr (pos, '/', end - pos); if (slash && !seen_slash_slash) if (*(slash + 1) == '/') { pos = slash + 2; seen_slash_slash = true; goto again; } /* At this point, SLASH is the location of the first / after "//", or the first slash altogether. START_INSERT is the pointer to the location where LINK will be inserted. When examining the last two examples, keep in mind that LINK begins with '/'. */ if (!slash && !seen_slash_slash) /* example: "foo" */ /* ^ */ start_insert = base; else if (!slash && seen_slash_slash) /* example: "http://foo" */ /* ^ */ start_insert = end; else if (slash && !seen_slash_slash) /* example: "foo/bar" */ /* ^ */ start_insert = base; else if (slash && seen_slash_slash) /* example: "http://something/" */ /* ^ */ start_insert = slash; span = start_insert - base; merge = xmalloc (span + linklength + 1); if (span) memcpy (merge, base, span); memcpy (merge + span, link, linklength); merge[span + linklength] = '\0'; } else { /* LINK is a relative URL: we need to replace everything after last slash (possibly empty) with LINK. So, if BASE is "whatever/foo/bar", and LINK is "qux/xyzzy", our result should be "whatever/foo/qux/xyzzy". */ bool need_explicit_slash = false; int span; const char *start_insert; const char *last_slash = find_last_char (base, end, '/'); if (!last_slash) { /* No slash found at all. Replace what we have with LINK. */ start_insert = base; } else if (last_slash && last_slash >= base + 2 && last_slash[-2] == ':' && last_slash[-1] == '/') { /* example: http://host" */ /* ^ */ start_insert = end + 1; need_explicit_slash = true; } else { /* example: "whatever/foo/bar" */ /* ^ */ start_insert = last_slash + 1; } span = start_insert - base; merge = xmalloc (span + linklength + 1); if (span) memcpy (merge, base, span); if (need_explicit_slash) merge[span - 1] = '/'; memcpy (merge + span, link, linklength); merge[span + linklength] = '\0'; } return merge; }
null
0
uri_merge (const char *base, const char *link) { int linklength; const char *end; char *merge; if (url_has_scheme (link)) return xstrdup (link); /* We may not examine BASE past END. */ end = path_end (base); linklength = strlen (link); if (!*link) { /* Empty LINK points back to BASE, query string and all. */ return xstrdup (base); } else if (*link == '?') { /* LINK points to the same location, but changes the query string. Examples: */ /* uri_merge("path", "?new") -> "path?new" */ /* uri_merge("path?foo", "?new") -> "path?new" */ /* uri_merge("path?foo#bar", "?new") -> "path?new" */ /* uri_merge("path#foo", "?new") -> "path?new" */ int baselength = end - base; merge = xmalloc (baselength + linklength + 1); memcpy (merge, base, baselength); memcpy (merge + baselength, link, linklength); merge[baselength + linklength] = '\0'; } else if (*link == '#') { /* uri_merge("path", "#new") -> "path#new" */ /* uri_merge("path#foo", "#new") -> "path#new" */ /* uri_merge("path?foo", "#new") -> "path?foo#new" */ /* uri_merge("path?foo#bar", "#new") -> "path?foo#new" */ int baselength; const char *end1 = strchr (base, '#'); if (!end1) end1 = base + strlen (base); baselength = end1 - base; merge = xmalloc (baselength + linklength + 1); memcpy (merge, base, baselength); memcpy (merge + baselength, link, linklength); merge[baselength + linklength] = '\0'; } else if (*link == '/' && *(link + 1) == '/') { /* LINK begins with "//" and so is a net path: we need to replace everything after (and including) the double slash with LINK. */ /* uri_merge("foo", "//new/bar") -> "//new/bar" */ /* uri_merge("//old/foo", "//new/bar") -> "//new/bar" */ /* uri_merge("http://old/foo", "//new/bar") -> "http://new/bar" */ int span; const char *slash; const char *start_insert; /* Look for first slash. */ slash = memchr (base, '/', end - base); /* If found slash and it is a double slash, then replace from this point, else default to replacing from the beginning. */ if (slash && *(slash + 1) == '/') start_insert = slash; else start_insert = base; span = start_insert - base; merge = xmalloc (span + linklength + 1); if (span) memcpy (merge, base, span); memcpy (merge + span, link, linklength); merge[span + linklength] = '\0'; } else if (*link == '/') { /* LINK is an absolute path: we need to replace everything after (and including) the FIRST slash with LINK. So, if BASE is "http://host/whatever/foo/bar", and LINK is "/qux/xyzzy", our result should be "http://host/qux/xyzzy". */ int span; const char *slash; const char *start_insert = NULL; /* for gcc to shut up. */ const char *pos = base; bool seen_slash_slash = false; /* We're looking for the first slash, but want to ignore double slash. */ again: slash = memchr (pos, '/', end - pos); if (slash && !seen_slash_slash) if (*(slash + 1) == '/') { pos = slash + 2; seen_slash_slash = true; goto again; } /* At this point, SLASH is the location of the first / after "//", or the first slash altogether. START_INSERT is the pointer to the location where LINK will be inserted. When examining the last two examples, keep in mind that LINK begins with '/'. */ if (!slash && !seen_slash_slash) /* example: "foo" */ /* ^ */ start_insert = base; else if (!slash && seen_slash_slash) /* example: "http://foo" */ /* ^ */ start_insert = end; else if (slash && !seen_slash_slash) /* example: "foo/bar" */ /* ^ */ start_insert = base; else if (slash && seen_slash_slash) /* example: "http://something/" */ /* ^ */ start_insert = slash; span = start_insert - base; merge = xmalloc (span + linklength + 1); if (span) memcpy (merge, base, span); memcpy (merge + span, link, linklength); merge[span + linklength] = '\0'; } else { /* LINK is a relative URL: we need to replace everything after last slash (possibly empty) with LINK. So, if BASE is "whatever/foo/bar", and LINK is "qux/xyzzy", our result should be "whatever/foo/qux/xyzzy". */ bool need_explicit_slash = false; int span; const char *start_insert; const char *last_slash = find_last_char (base, end, '/'); if (!last_slash) { /* No slash found at all. Replace what we have with LINK. */ start_insert = base; } else if (last_slash && last_slash >= base + 2 && last_slash[-2] == ':' && last_slash[-1] == '/') { /* example: http://host" */ /* ^ */ start_insert = end + 1; need_explicit_slash = true; } else { /* example: "whatever/foo/bar" */ /* ^ */ start_insert = last_slash + 1; } span = start_insert - base; merge = xmalloc (span + linklength + 1); if (span) memcpy (merge, base, span); if (need_explicit_slash) merge[span - 1] = '/'; memcpy (merge + span, link, linklength); merge[span + linklength] = '\0'; } return merge; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,946
url_escape (const char *s) { return url_escape_1 (s, urlchr_unsafe, false); }
null
0
url_escape (const char *s) { return url_escape_1 (s, urlchr_unsafe, false); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,947
url_escape_1 (const char *s, unsigned char mask, bool allow_passthrough) { const char *p1; char *p2, *newstr; int newlen; int addition = 0; for (p1 = s; *p1; p1++) if (urlchr_test (*p1, mask)) addition += 2; /* Two more characters (hex digits) */ if (!addition) return allow_passthrough ? (char *)s : xstrdup (s); newlen = (p1 - s) + addition; newstr = xmalloc (newlen + 1); p1 = s; p2 = newstr; while (*p1) { /* Quote the characters that match the test mask. */ if (urlchr_test (*p1, mask)) { unsigned char c = *p1++; *p2++ = '%'; *p2++ = XNUM_TO_DIGIT (c >> 4); *p2++ = XNUM_TO_DIGIT (c & 0xf); } else *p2++ = *p1++; } assert (p2 - newstr == newlen); *p2 = '\0'; return newstr; }
null
0
url_escape_1 (const char *s, unsigned char mask, bool allow_passthrough) { const char *p1; char *p2, *newstr; int newlen; int addition = 0; for (p1 = s; *p1; p1++) if (urlchr_test (*p1, mask)) addition += 2; /* Two more characters (hex digits) */ if (!addition) return allow_passthrough ? (char *)s : xstrdup (s); newlen = (p1 - s) + addition; newstr = xmalloc (newlen + 1); p1 = s; p2 = newstr; while (*p1) { /* Quote the characters that match the test mask. */ if (urlchr_test (*p1, mask)) { unsigned char c = *p1++; *p2++ = '%'; *p2++ = XNUM_TO_DIGIT (c >> 4); *p2++ = XNUM_TO_DIGIT (c & 0xf); } else *p2++ = *p1++; } assert (p2 - newstr == newlen); *p2 = '\0'; return newstr; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,948
url_escape_allow_passthrough (const char *s) { return url_escape_1 (s, urlchr_unsafe, true); }
null
0
url_escape_allow_passthrough (const char *s) { return url_escape_1 (s, urlchr_unsafe, true); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,949
url_escape_dir (const char *dir) { char *newdir = url_escape_1 (dir, urlchr_unsafe | urlchr_reserved, 1); if (newdir == dir) return (char *)dir; unescape_single_char (newdir, '/'); return newdir; }
null
0
url_escape_dir (const char *dir) { char *newdir = url_escape_1 (dir, urlchr_unsafe | urlchr_reserved, 1); if (newdir == dir) return (char *)dir; unescape_single_char (newdir, '/'); return newdir; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,950
url_free (struct url *url) { if (url) { if (url->idn_allocated) { idn2_free (url->host); /* A dummy if !defined(ENABLE_IRI) */ url->host = NULL; } else xfree (url->host); xfree (url->path); xfree (url->url); xfree (url->params); xfree (url->query); xfree (url->fragment); xfree (url->user); xfree (url->passwd); xfree (url->dir); xfree (url->file); xfree (url); } }
null
0
url_free (struct url *url) { if (url) { if (url->idn_allocated) { idn2_free (url->host); /* A dummy if !defined(ENABLE_IRI) */ url->host = NULL; } else xfree (url->host); xfree (url->path); xfree (url->url); xfree (url->params); xfree (url->query); xfree (url->fragment); xfree (url->user); xfree (url->passwd); xfree (url->dir); xfree (url->file); xfree (url); } }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,951
url_full_path (const struct url *url) { int length = full_path_length (url); char *full_path = xmalloc (length + 1); full_path_write (url, full_path); full_path[length] = '\0'; return full_path; }
null
0
url_full_path (const struct url *url) { int length = full_path_length (url); char *full_path = xmalloc (length + 1); full_path_write (url, full_path); full_path[length] = '\0'; return full_path; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,952
url_has_scheme (const char *url) { const char *p = url; /* The first char must be a scheme char. */ if (!*p || !SCHEME_CHAR (*p)) return false; ++p; /* Followed by 0 or more scheme chars. */ while (*p && SCHEME_CHAR (*p)) ++p; /* Terminated by ':'. */ return *p == ':'; }
null
0
url_has_scheme (const char *url) { const char *p = url; /* The first char must be a scheme char. */ if (!*p || !SCHEME_CHAR (*p)) return false; ++p; /* Followed by 0 or more scheme chars. */ while (*p && SCHEME_CHAR (*p)) ++p; /* Terminated by ':'. */ return *p == ':'; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + url_free(u); + error_code = PE_INVALID_HOST_NAME; + goto error; + } + } + /* Apply IDNA regardless of iri->utf8_encode status */ if (opt.enable_iri && iri) {
CWE-93
null
null
6,953
pvscsi_log2(uint32_t input) { int log = 0; assert(input > 0); while (input >> ++log) { } return log; }
DoS
0
pvscsi_log2(uint32_t input) { int log = 0; assert(input > 0); while (input >> ++log) { } return log; }
@@ -152,7 +152,7 @@ pvscsi_log2(uint32_t input) return log; } -static int +static void pvscsi_ring_init_data(PVSCSIRingInfo *m, PVSCSICmdDescSetupRings *ri) { int i; @@ -160,10 +160,6 @@ pvscsi_ring_init_data(PVSCSIRingInfo *m, PVSCSICmdDescSetupRings *ri) uint32_t req_ring_size, cmp_ring_size; m->rs_pa = ri->ringsStatePPN << VMW_PAGE_SHIFT; - if ((ri->reqRingNumPages > PVSCSI_SETUP_RINGS_MAX_NUM_PAGES) - || (ri->cmpRingNumPages > PVSCSI_SETUP_RINGS_MAX_NUM_PAGES)) { - return -1; - } req_ring_size = ri->reqRingNumPages * PVSCSI_MAX_NUM_REQ_ENTRIES_PER_PAGE; cmp_ring_size = ri->cmpRingNumPages * PVSCSI_MAX_NUM_CMP_ENTRIES_PER_PAGE; txr_len_log2 = pvscsi_log2(req_ring_size - 1); @@ -195,8 +191,6 @@ pvscsi_ring_init_data(PVSCSIRingInfo *m, PVSCSICmdDescSetupRings *ri) /* Flush ring state page changes */ smp_wmb(); - - return 0; } static int @@ -746,7 +740,7 @@ pvscsi_dbg_dump_tx_rings_config(PVSCSICmdDescSetupRings *rc) trace_pvscsi_tx_rings_num_pages("Confirm Ring", rc->cmpRingNumPages); for (i = 0; i < rc->cmpRingNumPages; i++) { - trace_pvscsi_tx_rings_ppn("Confirm Ring", rc->reqRingPPNs[i]); + trace_pvscsi_tx_rings_ppn("Confirm Ring", rc->cmpRingPPNs[i]); } } @@ -779,11 +773,16 @@ pvscsi_on_cmd_setup_rings(PVSCSIState *s) trace_pvscsi_on_cmd_arrived("PVSCSI_CMD_SETUP_RINGS"); - pvscsi_dbg_dump_tx_rings_config(rc); - if (pvscsi_ring_init_data(&s->rings, rc) < 0) { + if (!rc->reqRingNumPages + || rc->reqRingNumPages > PVSCSI_SETUP_RINGS_MAX_NUM_PAGES + || !rc->cmpRingNumPages + || rc->cmpRingNumPages > PVSCSI_SETUP_RINGS_MAX_NUM_PAGES) { return PVSCSI_COMMAND_PROCESSING_FAILED; } + pvscsi_dbg_dump_tx_rings_config(rc); + pvscsi_ring_init_data(&s->rings, rc); + s->rings_info_valid = TRUE; return PVSCSI_COMMAND_PROCESSING_SUCCEEDED; }
CWE-125
null
null
6,954
static bool name_is_illegal(const char *name) { return !*name || strchr(name, '/') != NULL; return !*name || strchr(name, '/') != NULL; }
Dir. Trav.
0
static bool name_is_illegal(const char *name) { return !*name || strchr(name, '/') != NULL; return !*name || strchr(name, '/') != NULL; }
@@ -1010,6 +1010,7 @@ static void v9fs_attach(void *opaque) goto out; } err += offset; + memcpy(&s->root_qid, &qid, sizeof(qid)); trace_v9fs_attach_return(pdu->tag, pdu->id, qid.type, qid.version, qid.path); /* @@ -1261,6 +1262,14 @@ static bool name_is_illegal(const char *name) return !*name || strchr(name, '/') != NULL; } +static bool not_same_qid(const V9fsQID *qid1, const V9fsQID *qid2) +{ + return + qid1->type != qid2->type || + qid1->version != qid2->version || + qid1->path != qid2->path; +} + static void v9fs_walk(void *opaque) { int name_idx; @@ -1276,6 +1285,7 @@ static void v9fs_walk(void *opaque) V9fsFidState *newfidp = NULL; V9fsPDU *pdu = opaque; V9fsState *s = pdu->s; + V9fsQID qid; err = pdu_unmarshal(pdu, offset, "ddw", &fid, &newfid, &nwnames); if (err < 0) { @@ -1309,6 +1319,12 @@ static void v9fs_walk(void *opaque) err = -ENOENT; goto out_nofid; } + + err = fid_to_qid(pdu, fidp, &qid); + if (err < 0) { + goto out; + } + v9fs_path_init(&dpath); v9fs_path_init(&path); /* @@ -1318,16 +1334,22 @@ static void v9fs_walk(void *opaque) v9fs_path_copy(&dpath, &fidp->path); v9fs_path_copy(&path, &fidp->path); for (name_idx = 0; name_idx < nwnames; name_idx++) { - err = v9fs_co_name_to_path(pdu, &dpath, wnames[name_idx].data, &path); - if (err < 0) { - goto out; - } - err = v9fs_co_lstat(pdu, &path, &stbuf); - if (err < 0) { - goto out; + if (not_same_qid(&pdu->s->root_qid, &qid) || + strcmp("..", wnames[name_idx].data)) { + err = v9fs_co_name_to_path(pdu, &dpath, wnames[name_idx].data, + &path); + if (err < 0) { + goto out; + } + + err = v9fs_co_lstat(pdu, &path, &stbuf); + if (err < 0) { + goto out; + } + stat_to_qid(&stbuf, &qid); + v9fs_path_copy(&dpath, &path); } - stat_to_qid(&stbuf, &qids[name_idx]); - v9fs_path_copy(&dpath, &path); + memcpy(&qids[name_idx], &qid, sizeof(qid)); } if (fid == newfid) { BUG_ON(fidp->fid_type != P9_FID_NONE);
CWE-22
null
null
6,955
static int stat_to_v9stat(V9fsPDU *pdu, V9fsPath *name, const struct stat *stbuf, V9fsStat *v9stat) { int err; const char *str; memset(v9stat, 0, sizeof(*v9stat)); stat_to_qid(stbuf, &v9stat->qid); v9stat->mode = stat_to_v9mode(stbuf); v9stat->atime = stbuf->st_atime; v9stat->mtime = stbuf->st_mtime; v9stat->length = stbuf->st_size; v9fs_string_null(&v9stat->uid); v9fs_string_null(&v9stat->gid); v9fs_string_null(&v9stat->muid); v9stat->n_uid = stbuf->st_uid; v9stat->n_gid = stbuf->st_gid; v9stat->n_muid = 0; v9fs_string_null(&v9stat->extension); if (v9stat->mode & P9_STAT_MODE_SYMLINK) { err = v9fs_co_readlink(pdu, name, &v9stat->extension); if (err < 0) { return err; } } else if (v9stat->mode & P9_STAT_MODE_DEVICE) { v9fs_string_sprintf(&v9stat->extension, "%c %u %u", S_ISCHR(stbuf->st_mode) ? 'c' : 'b', major(stbuf->st_rdev), minor(stbuf->st_rdev)); } else if (S_ISDIR(stbuf->st_mode) || S_ISREG(stbuf->st_mode)) { v9fs_string_sprintf(&v9stat->extension, "%s %lu", "HARDLINKCOUNT", (unsigned long)stbuf->st_nlink); } str = strrchr(name->data, '/'); if (str) { str += 1; } else { str = name->data; } v9fs_string_sprintf(&v9stat->name, "%s", str); v9stat->size = 61 + v9fs_string_size(&v9stat->name) + v9fs_string_size(&v9stat->uid) + v9fs_string_size(&v9stat->gid) + v9fs_string_size(&v9stat->muid) + v9fs_string_size(&v9stat->extension); return 0; }
Dir. Trav.
0
static int stat_to_v9stat(V9fsPDU *pdu, V9fsPath *name, const struct stat *stbuf, V9fsStat *v9stat) { int err; const char *str; memset(v9stat, 0, sizeof(*v9stat)); stat_to_qid(stbuf, &v9stat->qid); v9stat->mode = stat_to_v9mode(stbuf); v9stat->atime = stbuf->st_atime; v9stat->mtime = stbuf->st_mtime; v9stat->length = stbuf->st_size; v9fs_string_null(&v9stat->uid); v9fs_string_null(&v9stat->gid); v9fs_string_null(&v9stat->muid); v9stat->n_uid = stbuf->st_uid; v9stat->n_gid = stbuf->st_gid; v9stat->n_muid = 0; v9fs_string_null(&v9stat->extension); if (v9stat->mode & P9_STAT_MODE_SYMLINK) { err = v9fs_co_readlink(pdu, name, &v9stat->extension); if (err < 0) { return err; } } else if (v9stat->mode & P9_STAT_MODE_DEVICE) { v9fs_string_sprintf(&v9stat->extension, "%c %u %u", S_ISCHR(stbuf->st_mode) ? 'c' : 'b', major(stbuf->st_rdev), minor(stbuf->st_rdev)); } else if (S_ISDIR(stbuf->st_mode) || S_ISREG(stbuf->st_mode)) { v9fs_string_sprintf(&v9stat->extension, "%s %lu", "HARDLINKCOUNT", (unsigned long)stbuf->st_nlink); } str = strrchr(name->data, '/'); if (str) { str += 1; } else { str = name->data; } v9fs_string_sprintf(&v9stat->name, "%s", str); v9stat->size = 61 + v9fs_string_size(&v9stat->name) + v9fs_string_size(&v9stat->uid) + v9fs_string_size(&v9stat->gid) + v9fs_string_size(&v9stat->muid) + v9fs_string_size(&v9stat->extension); return 0; }
@@ -1010,6 +1010,7 @@ static void v9fs_attach(void *opaque) goto out; } err += offset; + memcpy(&s->root_qid, &qid, sizeof(qid)); trace_v9fs_attach_return(pdu->tag, pdu->id, qid.type, qid.version, qid.path); /* @@ -1261,6 +1262,14 @@ static bool name_is_illegal(const char *name) return !*name || strchr(name, '/') != NULL; } +static bool not_same_qid(const V9fsQID *qid1, const V9fsQID *qid2) +{ + return + qid1->type != qid2->type || + qid1->version != qid2->version || + qid1->path != qid2->path; +} + static void v9fs_walk(void *opaque) { int name_idx; @@ -1276,6 +1285,7 @@ static void v9fs_walk(void *opaque) V9fsFidState *newfidp = NULL; V9fsPDU *pdu = opaque; V9fsState *s = pdu->s; + V9fsQID qid; err = pdu_unmarshal(pdu, offset, "ddw", &fid, &newfid, &nwnames); if (err < 0) { @@ -1309,6 +1319,12 @@ static void v9fs_walk(void *opaque) err = -ENOENT; goto out_nofid; } + + err = fid_to_qid(pdu, fidp, &qid); + if (err < 0) { + goto out; + } + v9fs_path_init(&dpath); v9fs_path_init(&path); /* @@ -1318,16 +1334,22 @@ static void v9fs_walk(void *opaque) v9fs_path_copy(&dpath, &fidp->path); v9fs_path_copy(&path, &fidp->path); for (name_idx = 0; name_idx < nwnames; name_idx++) { - err = v9fs_co_name_to_path(pdu, &dpath, wnames[name_idx].data, &path); - if (err < 0) { - goto out; - } - err = v9fs_co_lstat(pdu, &path, &stbuf); - if (err < 0) { - goto out; + if (not_same_qid(&pdu->s->root_qid, &qid) || + strcmp("..", wnames[name_idx].data)) { + err = v9fs_co_name_to_path(pdu, &dpath, wnames[name_idx].data, + &path); + if (err < 0) { + goto out; + } + + err = v9fs_co_lstat(pdu, &path, &stbuf); + if (err < 0) { + goto out; + } + stat_to_qid(&stbuf, &qid); + v9fs_path_copy(&dpath, &path); } - stat_to_qid(&stbuf, &qids[name_idx]); - v9fs_path_copy(&dpath, &path); + memcpy(&qids[name_idx], &qid, sizeof(qid)); } if (fid == newfid) { BUG_ON(fidp->fid_type != P9_FID_NONE);
CWE-22
null
null
6,956
static void v9fs_fix_path(V9fsPath *dst, V9fsPath *src, int len) { V9fsPath str; v9fs_path_init(&str); v9fs_path_copy(&str, dst); v9fs_string_sprintf((V9fsString *)dst, "%s%s", src->data, str.data+len); v9fs_path_free(&str); /* +1 to include terminating NULL */ dst->size++; }
Dir. Trav.
0
static void v9fs_fix_path(V9fsPath *dst, V9fsPath *src, int len) { V9fsPath str; v9fs_path_init(&str); v9fs_path_copy(&str, dst); v9fs_string_sprintf((V9fsString *)dst, "%s%s", src->data, str.data+len); v9fs_path_free(&str); /* +1 to include terminating NULL */ dst->size++; }
@@ -1010,6 +1010,7 @@ static void v9fs_attach(void *opaque) goto out; } err += offset; + memcpy(&s->root_qid, &qid, sizeof(qid)); trace_v9fs_attach_return(pdu->tag, pdu->id, qid.type, qid.version, qid.path); /* @@ -1261,6 +1262,14 @@ static bool name_is_illegal(const char *name) return !*name || strchr(name, '/') != NULL; } +static bool not_same_qid(const V9fsQID *qid1, const V9fsQID *qid2) +{ + return + qid1->type != qid2->type || + qid1->version != qid2->version || + qid1->path != qid2->path; +} + static void v9fs_walk(void *opaque) { int name_idx; @@ -1276,6 +1285,7 @@ static void v9fs_walk(void *opaque) V9fsFidState *newfidp = NULL; V9fsPDU *pdu = opaque; V9fsState *s = pdu->s; + V9fsQID qid; err = pdu_unmarshal(pdu, offset, "ddw", &fid, &newfid, &nwnames); if (err < 0) { @@ -1309,6 +1319,12 @@ static void v9fs_walk(void *opaque) err = -ENOENT; goto out_nofid; } + + err = fid_to_qid(pdu, fidp, &qid); + if (err < 0) { + goto out; + } + v9fs_path_init(&dpath); v9fs_path_init(&path); /* @@ -1318,16 +1334,22 @@ static void v9fs_walk(void *opaque) v9fs_path_copy(&dpath, &fidp->path); v9fs_path_copy(&path, &fidp->path); for (name_idx = 0; name_idx < nwnames; name_idx++) { - err = v9fs_co_name_to_path(pdu, &dpath, wnames[name_idx].data, &path); - if (err < 0) { - goto out; - } - err = v9fs_co_lstat(pdu, &path, &stbuf); - if (err < 0) { - goto out; + if (not_same_qid(&pdu->s->root_qid, &qid) || + strcmp("..", wnames[name_idx].data)) { + err = v9fs_co_name_to_path(pdu, &dpath, wnames[name_idx].data, + &path); + if (err < 0) { + goto out; + } + + err = v9fs_co_lstat(pdu, &path, &stbuf); + if (err < 0) { + goto out; + } + stat_to_qid(&stbuf, &qid); + v9fs_path_copy(&dpath, &path); } - stat_to_qid(&stbuf, &qids[name_idx]); - v9fs_path_copy(&dpath, &path); + memcpy(&qids[name_idx], &qid, sizeof(qid)); } if (fid == newfid) { BUG_ON(fidp->fid_type != P9_FID_NONE);
CWE-22
null
null
6,957
void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) { /* * We need to be idempotent because, unfortunately, free() also calls * cleanup(), so the natural call sequence new(), init(), cleanup(), free() * calls cleanup() for the same object twice! Thus we must zero the * pointers below after they're freed! */ /* Seems to always be 0 in OpenSSL, do this at most once. */ if (ctx->cleanup != NULL) { ctx->cleanup(ctx); ctx->cleanup = NULL; } if (ctx->param != NULL) { if (ctx->parent == NULL) X509_VERIFY_PARAM_free(ctx->param); ctx->param = NULL; } if (ctx->tree != NULL) { X509_policy_tree_free(ctx->tree); ctx->tree = NULL; } if (ctx->chain != NULL) { sk_X509_pop_free(ctx->chain, X509_free); ctx->chain = NULL; } CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE_CTX, ctx, &(ctx->ex_data)); memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); }
DoS
0
void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) { /* * We need to be idempotent because, unfortunately, free() also calls * cleanup(), so the natural call sequence new(), init(), cleanup(), free() * calls cleanup() for the same object twice! Thus we must zero the * pointers below after they're freed! */ /* Seems to always be 0 in OpenSSL, do this at most once. */ if (ctx->cleanup != NULL) { ctx->cleanup(ctx); ctx->cleanup = NULL; } if (ctx->param != NULL) { if (ctx->parent == NULL) X509_VERIFY_PARAM_free(ctx->param); ctx->param = NULL; } if (ctx->tree != NULL) { X509_policy_tree_free(ctx->tree); ctx->tree = NULL; } if (ctx->chain != NULL) { sk_X509_pop_free(ctx->chain, X509_free); ctx->chain = NULL; } CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE_CTX, ctx, &(ctx->ex_data)); memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,958
static int check_cert(X509_STORE_CTX *ctx) { X509_CRL *crl = NULL, *dcrl = NULL; X509 *x; int ok, cnum; unsigned int last_reasons; cnum = ctx->error_depth; x = sk_X509_value(ctx->chain, cnum); ctx->current_cert = x; ctx->current_issuer = NULL; ctx->current_crl_score = 0; ctx->current_reasons = 0; if (x->ex_flags & EXFLAG_PROXY) return 1; while (ctx->current_reasons != CRLDP_ALL_REASONS) { last_reasons = ctx->current_reasons; /* Try to retrieve relevant CRL */ if (ctx->get_crl) ok = ctx->get_crl(ctx, &crl, x); else ok = get_crl_delta(ctx, &crl, &dcrl, x); /* * If error looking up CRL, nothing we can do except notify callback */ if (!ok) { ctx->error = X509_V_ERR_UNABLE_TO_GET_CRL; ok = ctx->verify_cb(0, ctx); goto err; } ctx->current_crl = crl; ok = ctx->check_crl(ctx, crl); if (!ok) goto err; if (dcrl) { ok = ctx->check_crl(ctx, dcrl); if (!ok) goto err; ok = ctx->cert_crl(ctx, dcrl, x); if (!ok) goto err; } else ok = 1; /* Don't look in full CRL if delta reason is removefromCRL */ if (ok != 2) { ok = ctx->cert_crl(ctx, crl, x); if (!ok) goto err; } X509_CRL_free(crl); X509_CRL_free(dcrl); crl = NULL; dcrl = NULL; /* * If reasons not updated we wont get anywhere by another iteration, * so exit loop. */ if (last_reasons == ctx->current_reasons) { ctx->error = X509_V_ERR_UNABLE_TO_GET_CRL; ok = ctx->verify_cb(0, ctx); goto err; } } err: X509_CRL_free(crl); X509_CRL_free(dcrl); ctx->current_crl = NULL; return ok; }
DoS
0
static int check_cert(X509_STORE_CTX *ctx) { X509_CRL *crl = NULL, *dcrl = NULL; X509 *x; int ok, cnum; unsigned int last_reasons; cnum = ctx->error_depth; x = sk_X509_value(ctx->chain, cnum); ctx->current_cert = x; ctx->current_issuer = NULL; ctx->current_crl_score = 0; ctx->current_reasons = 0; if (x->ex_flags & EXFLAG_PROXY) return 1; while (ctx->current_reasons != CRLDP_ALL_REASONS) { last_reasons = ctx->current_reasons; /* Try to retrieve relevant CRL */ if (ctx->get_crl) ok = ctx->get_crl(ctx, &crl, x); else ok = get_crl_delta(ctx, &crl, &dcrl, x); /* * If error looking up CRL, nothing we can do except notify callback */ if (!ok) { ctx->error = X509_V_ERR_UNABLE_TO_GET_CRL; ok = ctx->verify_cb(0, ctx); goto err; } ctx->current_crl = crl; ok = ctx->check_crl(ctx, crl); if (!ok) goto err; if (dcrl) { ok = ctx->check_crl(ctx, dcrl); if (!ok) goto err; ok = ctx->cert_crl(ctx, dcrl, x); if (!ok) goto err; } else ok = 1; /* Don't look in full CRL if delta reason is removefromCRL */ if (ok != 2) { ok = ctx->cert_crl(ctx, crl, x); if (!ok) goto err; } X509_CRL_free(crl); X509_CRL_free(dcrl); crl = NULL; dcrl = NULL; /* * If reasons not updated we wont get anywhere by another iteration, * so exit loop. */ if (last_reasons == ctx->current_reasons) { ctx->error = X509_V_ERR_UNABLE_TO_GET_CRL; ok = ctx->verify_cb(0, ctx); goto err; } } err: X509_CRL_free(crl); X509_CRL_free(dcrl); ctx->current_crl = NULL; return ok; }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,959
static int check_chain_extensions(X509_STORE_CTX *ctx) { #ifdef OPENSSL_NO_CHAIN_VERIFY return 1; #else int i, ok = 0, must_be_ca, plen = 0; X509 *x; int (*cb) (int xok, X509_STORE_CTX *xctx); int proxy_path_length = 0; int purpose; int allow_proxy_certs; cb = ctx->verify_cb; /*- * must_be_ca can have 1 of 3 values: * -1: we accept both CA and non-CA certificates, to allow direct * use of self-signed certificates (which are marked as CA). * 0: we only accept non-CA certificates. This is currently not * used, but the possibility is present for future extensions. * 1: we only accept CA certificates. This is currently used for * all certificates in the chain except the leaf certificate. */ must_be_ca = -1; /* CRL path validation */ if (ctx->parent) { allow_proxy_certs = 0; purpose = X509_PURPOSE_CRL_SIGN; } else { allow_proxy_certs = ! !(ctx->param->flags & X509_V_FLAG_ALLOW_PROXY_CERTS); /* * A hack to keep people who don't want to modify their software * happy */ if (getenv("OPENSSL_ALLOW_PROXY_CERTS")) allow_proxy_certs = 1; purpose = ctx->param->purpose; } /* Check all untrusted certificates */ for (i = 0; i < ctx->last_untrusted; i++) { int ret; x = sk_X509_value(ctx->chain, i); if (!(ctx->param->flags & X509_V_FLAG_IGNORE_CRITICAL) && (x->ex_flags & EXFLAG_CRITICAL)) { ctx->error = X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } if (!allow_proxy_certs && (x->ex_flags & EXFLAG_PROXY)) { ctx->error = X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } ret = X509_check_ca(x); switch (must_be_ca) { case -1: if ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && (ret != 1) && (ret != 0)) { ret = 0; ctx->error = X509_V_ERR_INVALID_CA; } else ret = 1; break; case 0: if (ret != 0) { ret = 0; ctx->error = X509_V_ERR_INVALID_NON_CA; } else ret = 1; break; default: if ((ret == 0) || ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && (ret != 1))) { ret = 0; ctx->error = X509_V_ERR_INVALID_CA; } else ret = 1; break; } if (ret == 0) { ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } if (ctx->param->purpose > 0) { ret = X509_check_purpose(x, purpose, must_be_ca > 0); if ((ret == 0) || ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && (ret != 1))) { ctx->error = X509_V_ERR_INVALID_PURPOSE; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } } /* Check pathlen if not self issued */ if ((i > 1) && !(x->ex_flags & EXFLAG_SI) && (x->ex_pathlen != -1) && (plen > (x->ex_pathlen + proxy_path_length + 1))) { ctx->error = X509_V_ERR_PATH_LENGTH_EXCEEDED; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } /* Increment path length if not self issued */ if (!(x->ex_flags & EXFLAG_SI)) plen++; /* * If this certificate is a proxy certificate, the next certificate * must be another proxy certificate or a EE certificate. If not, * the next certificate must be a CA certificate. */ if (x->ex_flags & EXFLAG_PROXY) { /* * RFC3820, 4.1.3 (b)(1) stipulates that if pCPathLengthConstraint * is less than max_path_length, the former should be copied to * the latter, and 4.1.4 (a) stipulates that max_path_length * should be verified to be larger than zero and decrement it. * * Because we're checking the certs in the reverse order, we start * with verifying that proxy_path_length isn't larger than pcPLC, * and copy the latter to the former if it is, and finally, * increment proxy_path_length. */ if (x->ex_pcpathlen != -1) { if (proxy_path_length > x->ex_pcpathlen) { ctx->error = X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } proxy_path_length = x->ex_pcpathlen; } proxy_path_length++; must_be_ca = 0; } else must_be_ca = 1; } ok = 1; end: return ok; #endif }
DoS
0
static int check_chain_extensions(X509_STORE_CTX *ctx) { #ifdef OPENSSL_NO_CHAIN_VERIFY return 1; #else int i, ok = 0, must_be_ca, plen = 0; X509 *x; int (*cb) (int xok, X509_STORE_CTX *xctx); int proxy_path_length = 0; int purpose; int allow_proxy_certs; cb = ctx->verify_cb; /*- * must_be_ca can have 1 of 3 values: * -1: we accept both CA and non-CA certificates, to allow direct * use of self-signed certificates (which are marked as CA). * 0: we only accept non-CA certificates. This is currently not * used, but the possibility is present for future extensions. * 1: we only accept CA certificates. This is currently used for * all certificates in the chain except the leaf certificate. */ must_be_ca = -1; /* CRL path validation */ if (ctx->parent) { allow_proxy_certs = 0; purpose = X509_PURPOSE_CRL_SIGN; } else { allow_proxy_certs = ! !(ctx->param->flags & X509_V_FLAG_ALLOW_PROXY_CERTS); /* * A hack to keep people who don't want to modify their software * happy */ if (getenv("OPENSSL_ALLOW_PROXY_CERTS")) allow_proxy_certs = 1; purpose = ctx->param->purpose; } /* Check all untrusted certificates */ for (i = 0; i < ctx->last_untrusted; i++) { int ret; x = sk_X509_value(ctx->chain, i); if (!(ctx->param->flags & X509_V_FLAG_IGNORE_CRITICAL) && (x->ex_flags & EXFLAG_CRITICAL)) { ctx->error = X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } if (!allow_proxy_certs && (x->ex_flags & EXFLAG_PROXY)) { ctx->error = X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } ret = X509_check_ca(x); switch (must_be_ca) { case -1: if ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && (ret != 1) && (ret != 0)) { ret = 0; ctx->error = X509_V_ERR_INVALID_CA; } else ret = 1; break; case 0: if (ret != 0) { ret = 0; ctx->error = X509_V_ERR_INVALID_NON_CA; } else ret = 1; break; default: if ((ret == 0) || ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && (ret != 1))) { ret = 0; ctx->error = X509_V_ERR_INVALID_CA; } else ret = 1; break; } if (ret == 0) { ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } if (ctx->param->purpose > 0) { ret = X509_check_purpose(x, purpose, must_be_ca > 0); if ((ret == 0) || ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && (ret != 1))) { ctx->error = X509_V_ERR_INVALID_PURPOSE; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } } /* Check pathlen if not self issued */ if ((i > 1) && !(x->ex_flags & EXFLAG_SI) && (x->ex_pathlen != -1) && (plen > (x->ex_pathlen + proxy_path_length + 1))) { ctx->error = X509_V_ERR_PATH_LENGTH_EXCEEDED; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } /* Increment path length if not self issued */ if (!(x->ex_flags & EXFLAG_SI)) plen++; /* * If this certificate is a proxy certificate, the next certificate * must be another proxy certificate or a EE certificate. If not, * the next certificate must be a CA certificate. */ if (x->ex_flags & EXFLAG_PROXY) { /* * RFC3820, 4.1.3 (b)(1) stipulates that if pCPathLengthConstraint * is less than max_path_length, the former should be copied to * the latter, and 4.1.4 (a) stipulates that max_path_length * should be verified to be larger than zero and decrement it. * * Because we're checking the certs in the reverse order, we start * with verifying that proxy_path_length isn't larger than pcPLC, * and copy the latter to the former if it is, and finally, * increment proxy_path_length. */ if (x->ex_pcpathlen != -1) { if (proxy_path_length > x->ex_pcpathlen) { ctx->error = X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED; ctx->error_depth = i; ctx->current_cert = x; ok = cb(0, ctx); if (!ok) goto end; } proxy_path_length = x->ex_pcpathlen; } proxy_path_length++; must_be_ca = 0; } else must_be_ca = 1; } ok = 1; end: return ok; #endif }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,960
static int check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) { X509 *issuer = NULL; EVP_PKEY *ikey = NULL; int ok = 0, chnum, cnum; cnum = ctx->error_depth; chnum = sk_X509_num(ctx->chain) - 1; /* if we have an alternative CRL issuer cert use that */ if (ctx->current_issuer) issuer = ctx->current_issuer; /* * Else find CRL issuer: if not last certificate then issuer is next * certificate in chain. */ else if (cnum < chnum) issuer = sk_X509_value(ctx->chain, cnum + 1); else { issuer = sk_X509_value(ctx->chain, chnum); /* If not self signed, can't check signature */ if (!ctx->check_issued(ctx, issuer, issuer)) { ctx->error = X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } if (issuer) { /* * Skip most tests for deltas because they have already been done */ if (!crl->base_crl_number) { /* Check for cRLSign bit if keyUsage present */ if ((issuer->ex_flags & EXFLAG_KUSAGE) && !(issuer->ex_kusage & KU_CRL_SIGN)) { ctx->error = X509_V_ERR_KEYUSAGE_NO_CRL_SIGN; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } if (!(ctx->current_crl_score & CRL_SCORE_SCOPE)) { ctx->error = X509_V_ERR_DIFFERENT_CRL_SCOPE; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } if (!(ctx->current_crl_score & CRL_SCORE_SAME_PATH)) { if (check_crl_path(ctx, ctx->current_issuer) <= 0) { ctx->error = X509_V_ERR_CRL_PATH_VALIDATION_ERROR; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } if (crl->idp_flags & IDP_INVALID) { ctx->error = X509_V_ERR_INVALID_EXTENSION; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } if (!(ctx->current_crl_score & CRL_SCORE_TIME)) { ok = check_crl_time(ctx, crl, 1); if (!ok) goto err; } /* Attempt to get issuer certificate public key */ ikey = X509_get_pubkey(issuer); if (!ikey) { ctx->error = X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } else { int rv; rv = X509_CRL_check_suiteb(crl, ikey, ctx->param->flags); if (rv != X509_V_OK) { ctx->error = rv; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } /* Verify CRL signature */ if (X509_CRL_verify(crl, ikey) <= 0) { ctx->error = X509_V_ERR_CRL_SIGNATURE_FAILURE; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } } ok = 1; err: EVP_PKEY_free(ikey); return ok; }
DoS
0
static int check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) { X509 *issuer = NULL; EVP_PKEY *ikey = NULL; int ok = 0, chnum, cnum; cnum = ctx->error_depth; chnum = sk_X509_num(ctx->chain) - 1; /* if we have an alternative CRL issuer cert use that */ if (ctx->current_issuer) issuer = ctx->current_issuer; /* * Else find CRL issuer: if not last certificate then issuer is next * certificate in chain. */ else if (cnum < chnum) issuer = sk_X509_value(ctx->chain, cnum + 1); else { issuer = sk_X509_value(ctx->chain, chnum); /* If not self signed, can't check signature */ if (!ctx->check_issued(ctx, issuer, issuer)) { ctx->error = X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } if (issuer) { /* * Skip most tests for deltas because they have already been done */ if (!crl->base_crl_number) { /* Check for cRLSign bit if keyUsage present */ if ((issuer->ex_flags & EXFLAG_KUSAGE) && !(issuer->ex_kusage & KU_CRL_SIGN)) { ctx->error = X509_V_ERR_KEYUSAGE_NO_CRL_SIGN; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } if (!(ctx->current_crl_score & CRL_SCORE_SCOPE)) { ctx->error = X509_V_ERR_DIFFERENT_CRL_SCOPE; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } if (!(ctx->current_crl_score & CRL_SCORE_SAME_PATH)) { if (check_crl_path(ctx, ctx->current_issuer) <= 0) { ctx->error = X509_V_ERR_CRL_PATH_VALIDATION_ERROR; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } if (crl->idp_flags & IDP_INVALID) { ctx->error = X509_V_ERR_INVALID_EXTENSION; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } if (!(ctx->current_crl_score & CRL_SCORE_TIME)) { ok = check_crl_time(ctx, crl, 1); if (!ok) goto err; } /* Attempt to get issuer certificate public key */ ikey = X509_get_pubkey(issuer); if (!ikey) { ctx->error = X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } else { int rv; rv = X509_CRL_check_suiteb(crl, ikey, ctx->param->flags); if (rv != X509_V_OK) { ctx->error = rv; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } /* Verify CRL signature */ if (X509_CRL_verify(crl, ikey) <= 0) { ctx->error = X509_V_ERR_CRL_SIGNATURE_FAILURE; ok = ctx->verify_cb(0, ctx); if (!ok) goto err; } } } ok = 1; err: EVP_PKEY_free(ikey); return ok; }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,961
static int check_hosts(X509 *x, X509_VERIFY_PARAM_ID *id) { int i; int n = sk_OPENSSL_STRING_num(id->hosts); char *name; if (id->peername != NULL) { OPENSSL_free(id->peername); id->peername = NULL; } for (i = 0; i < n; ++i) { name = sk_OPENSSL_STRING_value(id->hosts, i); if (X509_check_host(x, name, 0, id->hostflags, &id->peername) > 0) return 1; } return n == 0; }
DoS
0
static int check_hosts(X509 *x, X509_VERIFY_PARAM_ID *id) { int i; int n = sk_OPENSSL_STRING_num(id->hosts); char *name; if (id->peername != NULL) { OPENSSL_free(id->peername); id->peername = NULL; } for (i = 0; i < n; ++i) { name = sk_OPENSSL_STRING_value(id->hosts, i); if (X509_check_host(x, name, 0, id->hostflags, &id->peername) > 0) return 1; } return n == 0; }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,962
static int check_id(X509_STORE_CTX *ctx) { X509_VERIFY_PARAM *vpm = ctx->param; X509_VERIFY_PARAM_ID *id = vpm->id; X509 *x = ctx->cert; if (id->hosts && check_hosts(x, id) <= 0) { if (!check_id_error(ctx, X509_V_ERR_HOSTNAME_MISMATCH)) return 0; } if (id->email && X509_check_email(x, id->email, id->emaillen, 0) <= 0) { if (!check_id_error(ctx, X509_V_ERR_EMAIL_MISMATCH)) return 0; } if (id->ip && X509_check_ip(x, id->ip, id->iplen, 0) <= 0) { if (!check_id_error(ctx, X509_V_ERR_IP_ADDRESS_MISMATCH)) return 0; } return 1; }
DoS
0
static int check_id(X509_STORE_CTX *ctx) { X509_VERIFY_PARAM *vpm = ctx->param; X509_VERIFY_PARAM_ID *id = vpm->id; X509 *x = ctx->cert; if (id->hosts && check_hosts(x, id) <= 0) { if (!check_id_error(ctx, X509_V_ERR_HOSTNAME_MISMATCH)) return 0; } if (id->email && X509_check_email(x, id->email, id->emaillen, 0) <= 0) { if (!check_id_error(ctx, X509_V_ERR_EMAIL_MISMATCH)) return 0; } if (id->ip && X509_check_ip(x, id->ip, id->iplen, 0) <= 0) { if (!check_id_error(ctx, X509_V_ERR_IP_ADDRESS_MISMATCH)) return 0; } return 1; }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,963
static int check_id_error(X509_STORE_CTX *ctx, int errcode) { ctx->error = errcode; ctx->current_cert = ctx->cert; ctx->error_depth = 0; return ctx->verify_cb(0, ctx); }
DoS
0
static int check_id_error(X509_STORE_CTX *ctx, int errcode) { ctx->error = errcode; ctx->current_cert = ctx->cert; ctx->error_depth = 0; return ctx->verify_cb(0, ctx); }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,964
static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer) { int ret; ret = X509_check_issued(issuer, x); if (ret == X509_V_OK) return 1; /* If we haven't asked for issuer errors don't set ctx */ if (!(ctx->param->flags & X509_V_FLAG_CB_ISSUER_CHECK)) return 0; ctx->error = ret; ctx->current_cert = x; ctx->current_issuer = issuer; return ctx->verify_cb(0, ctx); }
DoS
0
static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer) { int ret; ret = X509_check_issued(issuer, x); if (ret == X509_V_OK) return 1; /* If we haven't asked for issuer errors don't set ctx */ if (!(ctx->param->flags & X509_V_FLAG_CB_ISSUER_CHECK)) return 0; ctx->error = ret; ctx->current_cert = x; ctx->current_issuer = issuer; return ctx->verify_cb(0, ctx); }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,965
static int check_policy(X509_STORE_CTX *ctx) { int ret; if (ctx->parent) return 1; ret = X509_policy_check(&ctx->tree, &ctx->explicit_policy, ctx->chain, ctx->param->policies, ctx->param->flags); if (ret == 0) { X509err(X509_F_CHECK_POLICY, ERR_R_MALLOC_FAILURE); ctx->error = X509_V_ERR_OUT_OF_MEM; return 0; } /* Invalid or inconsistent extensions */ if (ret == -1) { /* * Locate certificates with bad extensions and notify callback. */ X509 *x; int i; for (i = 1; i < sk_X509_num(ctx->chain); i++) { x = sk_X509_value(ctx->chain, i); if (!(x->ex_flags & EXFLAG_INVALID_POLICY)) continue; ctx->current_cert = x; ctx->error = X509_V_ERR_INVALID_POLICY_EXTENSION; if (!ctx->verify_cb(0, ctx)) return 0; } return 1; } if (ret == -2) { ctx->current_cert = NULL; ctx->error = X509_V_ERR_NO_EXPLICIT_POLICY; return ctx->verify_cb(0, ctx); } if (ctx->param->flags & X509_V_FLAG_NOTIFY_POLICY) { ctx->current_cert = NULL; /* * Verification errors need to be "sticky", a callback may have allowed * an SSL handshake to continue despite an error, and we must then * remain in an error state. Therefore, we MUST NOT clear earlier * verification errors by setting the error to X509_V_OK. */ if (!ctx->verify_cb(2, ctx)) return 0; } return 1; }
DoS
0
static int check_policy(X509_STORE_CTX *ctx) { int ret; if (ctx->parent) return 1; ret = X509_policy_check(&ctx->tree, &ctx->explicit_policy, ctx->chain, ctx->param->policies, ctx->param->flags); if (ret == 0) { X509err(X509_F_CHECK_POLICY, ERR_R_MALLOC_FAILURE); ctx->error = X509_V_ERR_OUT_OF_MEM; return 0; } /* Invalid or inconsistent extensions */ if (ret == -1) { /* * Locate certificates with bad extensions and notify callback. */ X509 *x; int i; for (i = 1; i < sk_X509_num(ctx->chain); i++) { x = sk_X509_value(ctx->chain, i); if (!(x->ex_flags & EXFLAG_INVALID_POLICY)) continue; ctx->current_cert = x; ctx->error = X509_V_ERR_INVALID_POLICY_EXTENSION; if (!ctx->verify_cb(0, ctx)) return 0; } return 1; } if (ret == -2) { ctx->current_cert = NULL; ctx->error = X509_V_ERR_NO_EXPLICIT_POLICY; return ctx->verify_cb(0, ctx); } if (ctx->param->flags & X509_V_FLAG_NOTIFY_POLICY) { ctx->current_cert = NULL; /* * Verification errors need to be "sticky", a callback may have allowed * an SSL handshake to continue despite an error, and we must then * remain in an error state. Therefore, we MUST NOT clear earlier * verification errors by setting the error to X509_V_OK. */ if (!ctx->verify_cb(2, ctx)) return 0; } return 1; }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,966
static X509 *lookup_cert_match(X509_STORE_CTX *ctx, X509 *x) { STACK_OF(X509) *certs; X509 *xtmp = NULL; int i; /* Lookup all certs with matching subject name */ certs = ctx->lookup_certs(ctx, X509_get_subject_name(x)); if (certs == NULL) return NULL; /* Look for exact match */ for (i = 0; i < sk_X509_num(certs); i++) { xtmp = sk_X509_value(certs, i); if (!X509_cmp(xtmp, x)) break; } if (i < sk_X509_num(certs)) CRYPTO_add(&xtmp->references, 1, CRYPTO_LOCK_X509); else xtmp = NULL; sk_X509_pop_free(certs, X509_free); return xtmp; }
DoS
0
static X509 *lookup_cert_match(X509_STORE_CTX *ctx, X509 *x) { STACK_OF(X509) *certs; X509 *xtmp = NULL; int i; /* Lookup all certs with matching subject name */ certs = ctx->lookup_certs(ctx, X509_get_subject_name(x)); if (certs == NULL) return NULL; /* Look for exact match */ for (i = 0; i < sk_X509_num(certs); i++) { xtmp = sk_X509_value(certs, i); if (!X509_cmp(xtmp, x)) break; } if (i < sk_X509_num(certs)) CRYPTO_add(&xtmp->references, 1, CRYPTO_LOCK_X509); else xtmp = NULL; sk_X509_pop_free(certs, X509_free); return xtmp; }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score || crl_score == 0) continue; /* If current CRL is equivalent use it if it is newer */ - if (crl_score == best_score) { + if (crl_score == best_score && best_crl != NULL) { int day, sec; if (ASN1_TIME_diff(&day, &sec, X509_CRL_get_lastUpdate(best_crl), X509_CRL_get_lastUpdate(crl)) == 0)
CWE-476
null
null
6,967
vcard7816_file_system_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { /* TODO: if we want to support a virtual file system card, we do it here. * It would probably be a pkcs #15 card type */ *response = vcard_make_response( VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED); return VCARD_DONE; }
DoS
0
vcard7816_file_system_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { /* TODO: if we want to support a virtual file system card, we do it here. * It would probably be a pkcs #15 card type */ *response = vcard_make_response( VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED); return VCARD_DONE; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,968
vcard_apdu_set_class(VCardAPDU *apdu) { apdu->a_channel = 0; apdu->a_secure_messaging = 0; apdu->a_type = apdu->a_cla & 0xf0; apdu->a_gen_type = VCARD_7816_ISO; /* parse the class tables 8 & 9 of the 7816-4 Part 4 spec */ switch (apdu->a_type) { /* we only support the basic types */ case 0x00: case 0x80: case 0x90: case 0xa0: apdu->a_channel = apdu->a_cla & 3; apdu->a_secure_messaging = apdu->a_cla & 0xe; break; case 0xb0: case 0xc0: break; case 0x10: case 0x20: case 0x30: case 0x40: case 0x50: case 0x60: case 0x70: /* Reserved for future use */ apdu->a_gen_type = VCARD_7816_RFU; break; case 0xd0: case 0xe0: case 0xf0: default: apdu->a_gen_type = (apdu->a_cla == 0xff) ? VCARD_7816_PTS : VCARD_7816_PROPRIETARY; break; } return VCARD7816_STATUS_SUCCESS; }
DoS
0
vcard_apdu_set_class(VCardAPDU *apdu) { apdu->a_channel = 0; apdu->a_secure_messaging = 0; apdu->a_type = apdu->a_cla & 0xf0; apdu->a_gen_type = VCARD_7816_ISO; /* parse the class tables 8 & 9 of the 7816-4 Part 4 spec */ switch (apdu->a_type) { /* we only support the basic types */ case 0x00: case 0x80: case 0x90: case 0xa0: apdu->a_channel = apdu->a_cla & 3; apdu->a_secure_messaging = apdu->a_cla & 0xe; break; case 0xb0: case 0xc0: break; case 0x10: case 0x20: case 0x30: case 0x40: case 0x50: case 0x60: case 0x70: /* Reserved for future use */ apdu->a_gen_type = VCARD_7816_RFU; break; case 0xd0: case 0xe0: case 0xf0: default: apdu->a_gen_type = (apdu->a_cla == 0xff) ? VCARD_7816_PTS : VCARD_7816_PROPRIETARY; break; } return VCARD7816_STATUS_SUCCESS; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,969
vcard_apdu_set_length(VCardAPDU *apdu) { int L, Le; /* process according to table 5 of the 7816-4 Part 4 spec. * variable names match the variables in the spec */ L = apdu->a_len-4; /* fixed APDU header */ apdu->a_Lc = 0; apdu->a_Le = 0; apdu->a_body = NULL; switch (L) { case 0: /* 1 minimal apdu */ return VCARD7816_STATUS_SUCCESS; case 1: /* 2S only return values apdu */ /* zero maps to 256 here */ apdu->a_Le = apdu->a_header->ah_Le ? apdu->a_header->ah_Le : 256; return VCARD7816_STATUS_SUCCESS; default: /* if the ah_Le byte is zero and we have more than * 1 byte in the header, then we must be using extended Le and Lc. * process the extended now. */ if (apdu->a_header->ah_Le == 0) { if (L < 3) { /* coding error, need at least 3 bytes */ return VCARD7816_STATUS_ERROR_WRONG_LENGTH; } /* calculate the first extended value. Could be either Le or Lc */ Le = (apdu->a_header->ah_body[0] << 8) | apdu->a_header->ah_body[1]; if (L == 3) { /* 2E extended, return data only */ /* zero maps to 65536 */ apdu->a_Le = Le ? Le : 65536; return VCARD7816_STATUS_SUCCESS; } if (Le == 0) { /* reserved for future use, probably for next time we need * to extend the lengths */ return VCARD7816_STATUS_ERROR_WRONG_LENGTH; } /* we know that the first extended value is Lc now */ apdu->a_Lc = Le; apdu->a_body = &apdu->a_header->ah_body[2]; if (L == Le+3) { /* 3E extended, only body parameters */ return VCARD7816_STATUS_SUCCESS; } if (L == Le+5) { /* 4E extended, parameters and return data */ Le = (apdu->a_data[apdu->a_len-2] << 8) | apdu->a_data[apdu->a_len-1]; apdu->a_Le = Le ? Le : 65536; return VCARD7816_STATUS_SUCCESS; } return VCARD7816_STATUS_ERROR_WRONG_LENGTH; } /* not extended */ apdu->a_Lc = apdu->a_header->ah_Le; apdu->a_body = &apdu->a_header->ah_body[0]; if (L == apdu->a_Lc + 1) { /* 3S only body parameters */ return VCARD7816_STATUS_SUCCESS; } if (L == apdu->a_Lc + 2) { /* 4S parameters and return data */ Le = apdu->a_data[apdu->a_len-1]; apdu->a_Le = Le ? Le : 256; return VCARD7816_STATUS_SUCCESS; } break; } return VCARD7816_STATUS_ERROR_WRONG_LENGTH; }
DoS
0
vcard_apdu_set_length(VCardAPDU *apdu) { int L, Le; /* process according to table 5 of the 7816-4 Part 4 spec. * variable names match the variables in the spec */ L = apdu->a_len-4; /* fixed APDU header */ apdu->a_Lc = 0; apdu->a_Le = 0; apdu->a_body = NULL; switch (L) { case 0: /* 1 minimal apdu */ return VCARD7816_STATUS_SUCCESS; case 1: /* 2S only return values apdu */ /* zero maps to 256 here */ apdu->a_Le = apdu->a_header->ah_Le ? apdu->a_header->ah_Le : 256; return VCARD7816_STATUS_SUCCESS; default: /* if the ah_Le byte is zero and we have more than * 1 byte in the header, then we must be using extended Le and Lc. * process the extended now. */ if (apdu->a_header->ah_Le == 0) { if (L < 3) { /* coding error, need at least 3 bytes */ return VCARD7816_STATUS_ERROR_WRONG_LENGTH; } /* calculate the first extended value. Could be either Le or Lc */ Le = (apdu->a_header->ah_body[0] << 8) | apdu->a_header->ah_body[1]; if (L == 3) { /* 2E extended, return data only */ /* zero maps to 65536 */ apdu->a_Le = Le ? Le : 65536; return VCARD7816_STATUS_SUCCESS; } if (Le == 0) { /* reserved for future use, probably for next time we need * to extend the lengths */ return VCARD7816_STATUS_ERROR_WRONG_LENGTH; } /* we know that the first extended value is Lc now */ apdu->a_Lc = Le; apdu->a_body = &apdu->a_header->ah_body[2]; if (L == Le+3) { /* 3E extended, only body parameters */ return VCARD7816_STATUS_SUCCESS; } if (L == Le+5) { /* 4E extended, parameters and return data */ Le = (apdu->a_data[apdu->a_len-2] << 8) | apdu->a_data[apdu->a_len-1]; apdu->a_Le = Le ? Le : 65536; return VCARD7816_STATUS_SUCCESS; } return VCARD7816_STATUS_ERROR_WRONG_LENGTH; } /* not extended */ apdu->a_Lc = apdu->a_header->ah_Le; apdu->a_body = &apdu->a_header->ah_body[0]; if (L == apdu->a_Lc + 1) { /* 3S only body parameters */ return VCARD7816_STATUS_SUCCESS; } if (L == apdu->a_Lc + 2) { /* 4S parameters and return data */ Le = apdu->a_data[apdu->a_len-1]; apdu->a_Le = Le ? Le : 256; return VCARD7816_STATUS_SUCCESS; } break; } return VCARD7816_STATUS_ERROR_WRONG_LENGTH; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,970
vcard_init_buffer_response(VCard *card, unsigned char *buf, int len) { VCardResponse *response; VCardBufferResponse *buffer_response; buffer_response = vcard_get_buffer_response(card); if (buffer_response) { vcard_set_buffer_response(card, NULL); vcard_buffer_response_delete(buffer_response); } buffer_response = vcard_buffer_response_new(buf, len); if (buffer_response == NULL) { return NULL; } response = vcard_response_new_status_bytes(VCARD7816_SW1_RESPONSE_BYTES, len > 255 ? 0 : len); if (response == NULL) { return NULL; } vcard_set_buffer_response(card, buffer_response); return response; }
DoS
0
vcard_init_buffer_response(VCard *card, unsigned char *buf, int len) { VCardResponse *response; VCardBufferResponse *buffer_response; buffer_response = vcard_get_buffer_response(card); if (buffer_response) { vcard_set_buffer_response(card, NULL); vcard_buffer_response_delete(buffer_response); } buffer_response = vcard_buffer_response_new(buf, len); if (buffer_response == NULL) { return NULL; } response = vcard_response_new_status_bytes(VCARD7816_SW1_RESPONSE_BYTES, len > 255 ? 0 : len); if (response == NULL) { return NULL; } vcard_set_buffer_response(card, buffer_response); return response; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,971
vcard_make_response(vcard_7816_status_t status) { VCardResponse *response; switch (status) { /* known 7816 response codes */ case VCARD7816_STATUS_SUCCESS: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_SUCCESS); case VCARD7816_STATUS_WARNING: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING); case VCARD7816_STATUS_WARNING_RET_CORUPT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_RET_CORUPT); case VCARD7816_STATUS_WARNING_BUF_END_BEFORE_LE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_BUF_END_BEFORE_LE); case VCARD7816_STATUS_WARNING_INVALID_FILE_SELECTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_INVALID_FILE_SELECTED); case VCARD7816_STATUS_WARNING_FCI_FORMAT_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_FCI_FORMAT_INVALID); case VCARD7816_STATUS_WARNING_CHANGE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_CHANGE); case VCARD7816_STATUS_WARNING_FILE_FILLED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_FILE_FILLED); case VCARD7816_STATUS_EXC_ERROR: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR); case VCARD7816_STATUS_EXC_ERROR_CHANGE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR_CHANGE); case VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE); case VCARD7816_STATUS_ERROR_WRONG_LENGTH: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_LENGTH); case VCARD7816_STATUS_ERROR_CLA_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CLA_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_CHANNEL_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CHANNEL_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_SECURE_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SECURE_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_COMMAND_INCOMPATIBLE_WITH_FILE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_COMMAND_INCOMPATIBLE_WITH_FILE); case VCARD7816_STATUS_ERROR_SECURITY_NOT_SATISFIED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SECURITY_NOT_SATISFIED); case VCARD7816_STATUS_ERROR_AUTHENTICATION_BLOCKED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_AUTHENTICATION_BLOCKED); case VCARD7816_STATUS_ERROR_DATA_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_DATA_INVALID); case VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED); case VCARD7816_STATUS_ERROR_DATA_NO_EF: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_DATA_NO_EF); case VCARD7816_STATUS_ERROR_SM_OBJECT_MISSING: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SM_OBJECT_MISSING); case VCARD7816_STATUS_ERROR_SM_OBJECT_INCORRECT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SM_OBJECT_INCORRECT); case VCARD7816_STATUS_ERROR_WRONG_PARAMETERS: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_PARAMETERS); case VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_IN_DATA: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_IN_DATA); case VCARD7816_STATUS_ERROR_FUNCTION_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_FUNCTION_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_FILE_NOT_FOUND: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_FILE_NOT_FOUND); case VCARD7816_STATUS_ERROR_RECORD_NOT_FOUND: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_RECORD_NOT_FOUND); case VCARD7816_STATUS_ERROR_NO_SPACE_FOR_FILE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_NO_SPACE_FOR_FILE); case VCARD7816_STATUS_ERROR_LC_TLV_INCONSISTENT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_LC_TLV_INCONSISTENT); case VCARD7816_STATUS_ERROR_P1_P2_INCORRECT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_P1_P2_INCORRECT); case VCARD7816_STATUS_ERROR_LC_P1_P2_INCONSISTENT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_LC_P1_P2_INCONSISTENT); case VCARD7816_STATUS_ERROR_DATA_NOT_FOUND: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_DATA_NOT_FOUND); case VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_2: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_2); case VCARD7816_STATUS_ERROR_INS_CODE_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_INS_CODE_INVALID); case VCARD7816_STATUS_ERROR_CLA_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CLA_INVALID); case VCARD7816_STATUS_ERROR_GENERAL: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_GENERAL); default: /* we don't know this status code, create a response buffer to * hold it */ response = vcard_response_new_status(status); if (response == NULL) { /* couldn't allocate the buffer, return memmory error */ return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE); } return response; } }
DoS
0
vcard_make_response(vcard_7816_status_t status) { VCardResponse *response; switch (status) { /* known 7816 response codes */ case VCARD7816_STATUS_SUCCESS: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_SUCCESS); case VCARD7816_STATUS_WARNING: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING); case VCARD7816_STATUS_WARNING_RET_CORUPT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_RET_CORUPT); case VCARD7816_STATUS_WARNING_BUF_END_BEFORE_LE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_BUF_END_BEFORE_LE); case VCARD7816_STATUS_WARNING_INVALID_FILE_SELECTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_INVALID_FILE_SELECTED); case VCARD7816_STATUS_WARNING_FCI_FORMAT_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_FCI_FORMAT_INVALID); case VCARD7816_STATUS_WARNING_CHANGE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_CHANGE); case VCARD7816_STATUS_WARNING_FILE_FILLED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_WARNING_FILE_FILLED); case VCARD7816_STATUS_EXC_ERROR: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR); case VCARD7816_STATUS_EXC_ERROR_CHANGE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR_CHANGE); case VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE); case VCARD7816_STATUS_ERROR_WRONG_LENGTH: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_LENGTH); case VCARD7816_STATUS_ERROR_CLA_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CLA_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_CHANNEL_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CHANNEL_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_SECURE_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SECURE_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_COMMAND_INCOMPATIBLE_WITH_FILE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_COMMAND_INCOMPATIBLE_WITH_FILE); case VCARD7816_STATUS_ERROR_SECURITY_NOT_SATISFIED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SECURITY_NOT_SATISFIED); case VCARD7816_STATUS_ERROR_AUTHENTICATION_BLOCKED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_AUTHENTICATION_BLOCKED); case VCARD7816_STATUS_ERROR_DATA_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_DATA_INVALID); case VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED); case VCARD7816_STATUS_ERROR_DATA_NO_EF: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_DATA_NO_EF); case VCARD7816_STATUS_ERROR_SM_OBJECT_MISSING: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SM_OBJECT_MISSING); case VCARD7816_STATUS_ERROR_SM_OBJECT_INCORRECT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_SM_OBJECT_INCORRECT); case VCARD7816_STATUS_ERROR_WRONG_PARAMETERS: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_PARAMETERS); case VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_IN_DATA: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_IN_DATA); case VCARD7816_STATUS_ERROR_FUNCTION_NOT_SUPPORTED: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_FUNCTION_NOT_SUPPORTED); case VCARD7816_STATUS_ERROR_FILE_NOT_FOUND: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_FILE_NOT_FOUND); case VCARD7816_STATUS_ERROR_RECORD_NOT_FOUND: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_RECORD_NOT_FOUND); case VCARD7816_STATUS_ERROR_NO_SPACE_FOR_FILE: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_NO_SPACE_FOR_FILE); case VCARD7816_STATUS_ERROR_LC_TLV_INCONSISTENT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_LC_TLV_INCONSISTENT); case VCARD7816_STATUS_ERROR_P1_P2_INCORRECT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_P1_P2_INCORRECT); case VCARD7816_STATUS_ERROR_LC_P1_P2_INCONSISTENT: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_LC_P1_P2_INCONSISTENT); case VCARD7816_STATUS_ERROR_DATA_NOT_FOUND: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_DATA_NOT_FOUND); case VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_2: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_WRONG_PARAMETERS_2); case VCARD7816_STATUS_ERROR_INS_CODE_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_INS_CODE_INVALID); case VCARD7816_STATUS_ERROR_CLA_INVALID: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_CLA_INVALID); case VCARD7816_STATUS_ERROR_GENERAL: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_ERROR_GENERAL); default: /* we don't know this status code, create a response buffer to * hold it */ response = vcard_response_new_status(status); if (response == NULL) { /* couldn't allocate the buffer, return memmory error */ return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE); } return response; } }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,972
vcard_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { VCardStatus status; VCardBufferResponse *buffer_response; /* first handle any PTS commands, which aren't really APDU's */ if (apdu->a_type == VCARD_7816_PTS) { /* the PTS responses aren't really responses either */ *response = vcard_response_new_data(apdu->a_data, apdu->a_len); /* PTS responses have no status bytes */ (*response)->b_total_len = (*response)->b_len; return VCARD_DONE; } buffer_response = vcard_get_buffer_response(card); if (buffer_response && apdu->a_ins != VCARD7816_INS_GET_RESPONSE) { /* clear out buffer_response, do not return an error */ vcard_set_buffer_response(card, NULL); vcard_buffer_response_delete(buffer_response); } status = vcard_process_applet_apdu(card, apdu, response); if (status != VCARD_NEXT) { return status; } switch (vcard_get_type(card)) { case VCARD_FILE_SYSTEM: return vcard7816_file_system_process_apdu(card, apdu, response); case VCARD_VM: return vcard7816_vm_process_apdu(card, apdu, response); case VCARD_DIRECT: /* if we are type direct, then the applet should handle everything */ assert(!"VCARD_DIRECT: applet failure"); break; default: g_warn_if_reached(); } *response = vcard_make_response(VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED); return VCARD_DONE; }
DoS
0
vcard_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { VCardStatus status; VCardBufferResponse *buffer_response; /* first handle any PTS commands, which aren't really APDU's */ if (apdu->a_type == VCARD_7816_PTS) { /* the PTS responses aren't really responses either */ *response = vcard_response_new_data(apdu->a_data, apdu->a_len); /* PTS responses have no status bytes */ (*response)->b_total_len = (*response)->b_len; return VCARD_DONE; } buffer_response = vcard_get_buffer_response(card); if (buffer_response && apdu->a_ins != VCARD7816_INS_GET_RESPONSE) { /* clear out buffer_response, do not return an error */ vcard_set_buffer_response(card, NULL); vcard_buffer_response_delete(buffer_response); } status = vcard_process_applet_apdu(card, apdu, response); if (status != VCARD_NEXT) { return status; } switch (vcard_get_type(card)) { case VCARD_FILE_SYSTEM: return vcard7816_file_system_process_apdu(card, apdu, response); case VCARD_VM: return vcard7816_vm_process_apdu(card, apdu, response); case VCARD_DIRECT: /* if we are type direct, then the applet should handle everything */ assert(!"VCARD_DIRECT: applet failure"); break; default: g_warn_if_reached(); } *response = vcard_make_response(VCARD7816_STATUS_ERROR_COMMAND_NOT_SUPPORTED); return VCARD_DONE; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,973
vcard_response_delete(VCardResponse *response) { if (response == NULL) { return; } switch (response->b_type) { case VCARD_MALLOC: /* everything was malloc'ed */ g_free(response->b_data); g_free(response); break; case VCARD_MALLOC_DATA: /* only the data buffer was malloc'ed */ g_free(response->b_data); break; case VCARD_MALLOC_STRUCT: /* only the structure was malloc'ed */ g_free(response); break; case VCARD_STATIC: break; default: g_warn_if_reached(); } }
DoS
0
vcard_response_delete(VCardResponse *response) { if (response == NULL) { return; } switch (response->b_type) { case VCARD_MALLOC: /* everything was malloc'ed */ g_free(response->b_data); g_free(response); break; case VCARD_MALLOC_DATA: /* only the data buffer was malloc'ed */ g_free(response->b_data); break; case VCARD_MALLOC_STRUCT: /* only the structure was malloc'ed */ g_free(response); break; case VCARD_STATIC: break; default: g_warn_if_reached(); } }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,974
vcard_response_new_bytes(VCard *card, unsigned char *buf, int len, int Le, unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; if (len > Le) { return vcard_init_buffer_response(card, buf, len); } new_response = vcard_response_new_data(buf, len); if (new_response == NULL) { return NULL; } vcard_response_set_status_bytes(new_response, sw1, sw2); return new_response; }
DoS
0
vcard_response_new_bytes(VCard *card, unsigned char *buf, int len, int Le, unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; if (len > Le) { return vcard_init_buffer_response(card, buf, len); } new_response = vcard_response_new_data(buf, len); if (new_response == NULL) { return NULL; } vcard_response_set_status_bytes(new_response, sw1, sw2); return new_response; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,975
vcard_response_new_data(unsigned char *buf, int len) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = g_malloc(len + 2); memcpy(new_response->b_data, buf, len); new_response->b_total_len = len+2; new_response->b_len = len; new_response->b_type = VCARD_MALLOC; return new_response; }
DoS
0
vcard_response_new_data(unsigned char *buf, int len) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = g_malloc(len + 2); memcpy(new_response->b_data, buf, len); new_response->b_total_len = len+2; new_response->b_len = len; new_response->b_type = VCARD_MALLOC; return new_response; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,976
vcard_response_new_status(vcard_7816_status_t status) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard_response_set_status(new_response, status); return new_response; }
DoS
0
vcard_response_new_status(vcard_7816_status_t status) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard_response_set_status(new_response, status); return new_response; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,977
vcard_response_new_status_bytes(unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard_response_set_status_bytes(new_response, sw1, sw2); return new_response; }
DoS
0
vcard_response_new_status_bytes(unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard_response_set_status_bytes(new_response, sw1, sw2); return new_response; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,978
vcard_response_set_status_bytes(VCardResponse *response, unsigned char sw1, unsigned char sw2) { response->b_status = sw1 << 8 | sw2; response->b_sw1 = sw1; response->b_sw2 = sw2; response->b_data[response->b_len] = sw1; response->b_data[response->b_len+1] = sw2; }
DoS
0
vcard_response_set_status_bytes(VCardResponse *response, unsigned char sw1, unsigned char sw2) { response->b_status = sw1 << 8 | sw2; response->b_sw1 = sw1; response->b_sw2 = sw2; response->b_data[response->b_len] = sw1; response->b_data[response->b_len+1] = sw2; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } *status = vcard_apdu_set_length(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); new_apdu = NULL; } return new_apdu;
CWE-772
null
null
6,979
static NOINLINE void attach_option( struct option_set **opt_list, const struct dhcp_optflag *optflag, char *buffer, int length, bool dhcpv6) { IF_NOT_UDHCPC6(bool dhcpv6 = 0;) struct option_set *existing; char *allocated = NULL; if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_BIN) { const char *end; allocated = xstrdup(buffer); /* more than enough */ end = hex2bin(allocated, buffer, 255); if (errno) bb_error_msg_and_die("malformed hex string '%s'", buffer); length = end - allocated; buffer = allocated; } #if ENABLE_FEATURE_UDHCP_RFC3397 if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_DNS_STRING) { /* reuse buffer and length for RFC1035-formatted string */ allocated = buffer = (char *)dname_enc(NULL, 0, buffer, &length); } #endif existing = udhcp_find_option(*opt_list, optflag->code); if (!existing) { struct option_set *new, **curr; /* make a new option */ log2("attaching option %02x to list", optflag->code); new = xmalloc(sizeof(*new)); if (!dhcpv6) { new->data = xmalloc(length + OPT_DATA); new->data[OPT_CODE] = optflag->code; new->data[OPT_LEN] = length; memcpy(new->data + OPT_DATA, buffer, length); } else { new->data = xmalloc(length + D6_OPT_DATA); new->data[D6_OPT_CODE] = optflag->code >> 8; new->data[D6_OPT_CODE + 1] = optflag->code & 0xff; new->data[D6_OPT_LEN] = length >> 8; new->data[D6_OPT_LEN + 1] = length & 0xff; memcpy(new->data + D6_OPT_DATA, buffer, length); } curr = opt_list; while (*curr && (*curr)->data[OPT_CODE] < optflag->code) curr = &(*curr)->next; new->next = *curr; *curr = new; goto ret; } if (optflag->flags & OPTION_LIST) { unsigned old_len; /* add it to an existing option */ log2("attaching option %02x to existing member of list", optflag->code); old_len = existing->data[OPT_LEN]; if (old_len + length < 255) { /* actually 255 is ok too, but adding a space can overlow it */ existing->data = xrealloc(existing->data, OPT_DATA + 1 + old_len + length); #if 0 if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING || (optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING_HOST ) { /* add space separator between STRING options in a list */ existing->data[OPT_DATA + old_len] = ' '; old_len++; } #endif memcpy(existing->data + OPT_DATA + old_len, buffer, length); existing->data[OPT_LEN] = old_len + length; } /* else, ignore the data, we could put this in a second option in the future */ } /* else, ignore the new data */ ret: free(allocated); }
+Info
0
static NOINLINE void attach_option( struct option_set **opt_list, const struct dhcp_optflag *optflag, char *buffer, int length, bool dhcpv6) { IF_NOT_UDHCPC6(bool dhcpv6 = 0;) struct option_set *existing; char *allocated = NULL; if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_BIN) { const char *end; allocated = xstrdup(buffer); /* more than enough */ end = hex2bin(allocated, buffer, 255); if (errno) bb_error_msg_and_die("malformed hex string '%s'", buffer); length = end - allocated; buffer = allocated; } #if ENABLE_FEATURE_UDHCP_RFC3397 if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_DNS_STRING) { /* reuse buffer and length for RFC1035-formatted string */ allocated = buffer = (char *)dname_enc(NULL, 0, buffer, &length); } #endif existing = udhcp_find_option(*opt_list, optflag->code); if (!existing) { struct option_set *new, **curr; /* make a new option */ log2("attaching option %02x to list", optflag->code); new = xmalloc(sizeof(*new)); if (!dhcpv6) { new->data = xmalloc(length + OPT_DATA); new->data[OPT_CODE] = optflag->code; new->data[OPT_LEN] = length; memcpy(new->data + OPT_DATA, buffer, length); } else { new->data = xmalloc(length + D6_OPT_DATA); new->data[D6_OPT_CODE] = optflag->code >> 8; new->data[D6_OPT_CODE + 1] = optflag->code & 0xff; new->data[D6_OPT_LEN] = length >> 8; new->data[D6_OPT_LEN + 1] = length & 0xff; memcpy(new->data + D6_OPT_DATA, buffer, length); } curr = opt_list; while (*curr && (*curr)->data[OPT_CODE] < optflag->code) curr = &(*curr)->next; new->next = *curr; *curr = new; goto ret; } if (optflag->flags & OPTION_LIST) { unsigned old_len; /* add it to an existing option */ log2("attaching option %02x to existing member of list", optflag->code); old_len = existing->data[OPT_LEN]; if (old_len + length < 255) { /* actually 255 is ok too, but adding a space can overlow it */ existing->data = xrealloc(existing->data, OPT_DATA + 1 + old_len + length); #if 0 if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING || (optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING_HOST ) { /* add space separator between STRING options in a list */ existing->data[OPT_DATA + old_len] = ' '; old_len++; } #endif memcpy(existing->data + OPT_DATA + old_len, buffer, length); existing->data[OPT_LEN] = old_len + length; } /* else, ignore the data, we could put this in a second option in the future */ } /* else, ignore the new data */ ret: free(allocated); }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,980
void FAST_FUNC udhcp_add_binary_option(struct dhcp_packet *packet, uint8_t *addopt) { unsigned len; uint8_t *optionptr = packet->options; unsigned end = udhcp_end_option(optionptr); len = OPT_DATA + addopt[OPT_LEN]; /* end position + (option code/length + addopt length) + end option */ if (end + len + 1 >= DHCP_OPTIONS_BUFSIZE) { bb_error_msg("option 0x%02x did not fit into the packet", addopt[OPT_CODE]); return; } log_option("adding option", addopt); memcpy(optionptr + end, addopt, len); optionptr[end + len] = DHCP_END; }
+Info
0
void FAST_FUNC udhcp_add_binary_option(struct dhcp_packet *packet, uint8_t *addopt) { unsigned len; uint8_t *optionptr = packet->options; unsigned end = udhcp_end_option(optionptr); len = OPT_DATA + addopt[OPT_LEN]; /* end position + (option code/length + addopt length) + end option */ if (end + len + 1 >= DHCP_OPTIONS_BUFSIZE) { bb_error_msg("option 0x%02x did not fit into the packet", addopt[OPT_CODE]); return; } log_option("adding option", addopt); memcpy(optionptr + end, addopt, len); optionptr[end + len] = DHCP_END; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,981
void FAST_FUNC udhcp_add_simple_option(struct dhcp_packet *packet, uint8_t code, uint32_t data) { const struct dhcp_optflag *dh; for (dh = dhcp_optflags; dh->code; dh++) { if (dh->code == code) { uint8_t option[6], len; option[OPT_CODE] = code; len = dhcp_option_lengths[dh->flags & OPTION_TYPE_MASK]; option[OPT_LEN] = len; if (BB_BIG_ENDIAN) data <<= 8 * (4 - len); /* Assignment is unaligned! */ move_to_unaligned32(&option[OPT_DATA], data); udhcp_add_binary_option(packet, option); return; } } bb_error_msg("can't add option 0x%02x", code); }
+Info
0
void FAST_FUNC udhcp_add_simple_option(struct dhcp_packet *packet, uint8_t code, uint32_t data) { const struct dhcp_optflag *dh; for (dh = dhcp_optflags; dh->code; dh++) { if (dh->code == code) { uint8_t option[6], len; option[OPT_CODE] = code; len = dhcp_option_lengths[dh->flags & OPTION_TYPE_MASK]; option[OPT_LEN] = len; if (BB_BIG_ENDIAN) data <<= 8 * (4 - len); /* Assignment is unaligned! */ move_to_unaligned32(&option[OPT_DATA], data); udhcp_add_binary_option(packet, option); return; } } bb_error_msg("can't add option 0x%02x", code); }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,982
int FAST_FUNC udhcp_end_option(uint8_t *optionptr) { int i = 0; while (optionptr[i] != DHCP_END) { if (optionptr[i] != DHCP_PADDING) i += optionptr[i + OPT_LEN] + OPT_DATA-1; i++; } return i; }
+Info
0
int FAST_FUNC udhcp_end_option(uint8_t *optionptr) { int i = 0; while (optionptr[i] != DHCP_END) { if (optionptr[i] != DHCP_PADDING) i += optionptr[i + OPT_LEN] + OPT_DATA-1; i++; } return i; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,983
struct option_set* FAST_FUNC udhcp_find_option(struct option_set *opt_list, uint8_t code) { while (opt_list && opt_list->data[OPT_CODE] < code) opt_list = opt_list->next; if (opt_list && opt_list->data[OPT_CODE] == code) return opt_list; return NULL; }
+Info
0
struct option_set* FAST_FUNC udhcp_find_option(struct option_set *opt_list, uint8_t code) { while (opt_list && opt_list->data[OPT_CODE] < code) opt_list = opt_list->next; if (opt_list && opt_list->data[OPT_CODE] == code) return opt_list; return NULL; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,984
int FAST_FUNC udhcp_str2nip(const char *str, void *arg) { len_and_sockaddr *lsa; lsa = host_and_af2sockaddr(str, 0, AF_INET); if (!lsa) return 0; /* arg maybe unaligned */ move_to_unaligned32((uint32_t*)arg, lsa->u.sin.sin_addr.s_addr); free(lsa); return 1; }
+Info
0
int FAST_FUNC udhcp_str2nip(const char *str, void *arg) { len_and_sockaddr *lsa; lsa = host_and_af2sockaddr(str, 0, AF_INET); if (!lsa) return 0; /* arg maybe unaligned */ move_to_unaligned32((uint32_t*)arg, lsa->u.sin.sin_addr.s_addr); free(lsa); return 1; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,985
int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg, const struct dhcp_optflag *optflags, const char *option_strings, bool dhcpv6) { struct option_set **opt_list = arg; char *opt; char *str; const struct dhcp_optflag *optflag; struct dhcp_optflag userdef_optflag; unsigned optcode; int retval; /* IP_PAIR needs 8 bytes, STATIC_ROUTES needs 9 max */ char buffer[9] ALIGNED(4); uint16_t *result_u16 = (uint16_t *) buffer; uint32_t *result_u32 = (uint32_t *) buffer; /* Cheat, the only *const* str possible is "" */ str = (char *) const_str; opt = strtok(str, " \t=:"); if (!opt) return 0; optcode = bb_strtou(opt, NULL, 0); if (!errno && optcode < 255) { /* Raw (numeric) option code. * Initially assume binary (hex-str), but if "str" or 'str' * is seen later, switch to STRING. */ userdef_optflag.flags = OPTION_BIN; userdef_optflag.code = optcode; optflag = &userdef_optflag; } else { optflag = &optflags[udhcp_option_idx(opt, option_strings)]; } /* Loop to handle OPTION_LIST case, else execute just once */ retval = 0; do { int length; char *val; if (optflag->flags == OPTION_BIN) { val = strtok(NULL, ""); /* do not split "'q w e'" */ trim(val); } else val = strtok(NULL, ", \t"); if (!val) break; length = dhcp_option_lengths[optflag->flags & OPTION_TYPE_MASK]; retval = 0; opt = buffer; /* new meaning for variable opt */ switch (optflag->flags & OPTION_TYPE_MASK) { case OPTION_IP: retval = udhcp_str2nip(val, buffer); break; case OPTION_IP_PAIR: retval = udhcp_str2nip(val, buffer); val = strtok(NULL, ", \t/-"); if (!val) retval = 0; if (retval) retval = udhcp_str2nip(val, buffer + 4); break; case_OPTION_STRING: case OPTION_STRING: case OPTION_STRING_HOST: #if ENABLE_FEATURE_UDHCP_RFC3397 case OPTION_DNS_STRING: #endif length = strnlen(val, 254); if (length > 0) { opt = val; retval = 1; } break; case OPTION_U8: buffer[0] = bb_strtou32(val, NULL, 0); retval = (errno == 0); break; /* htonX are macros in older libc's, using temp var * in code below for safety */ /* TODO: use bb_strtoX? */ case OPTION_U16: { uint32_t tmp = bb_strtou32(val, NULL, 0); *result_u16 = htons(tmp); retval = (errno == 0 /*&& tmp < 0x10000*/); break; } case OPTION_U32: { uint32_t tmp = bb_strtou32(val, NULL, 0); *result_u32 = htonl(tmp); retval = (errno == 0); break; } case OPTION_S32: { int32_t tmp = bb_strtoi32(val, NULL, 0); *result_u32 = htonl(tmp); retval = (errno == 0); break; } case OPTION_STATIC_ROUTES: { /* Input: "a.b.c.d/m" */ /* Output: mask(1 byte),pfx(0-4 bytes),gw(4 bytes) */ unsigned mask; char *slash = strchr(val, '/'); if (slash) { *slash = '\0'; retval = udhcp_str2nip(val, buffer + 1); buffer[0] = mask = bb_strtou(slash + 1, NULL, 10); val = strtok(NULL, ", \t/-"); if (!val || mask > 32 || errno) retval = 0; if (retval) { length = ((mask + 7) >> 3) + 5; retval = udhcp_str2nip(val, buffer + (length - 4)); } } break; } case OPTION_BIN: /* Raw (numeric) option code. Is it a string? */ if (val[0] == '"' || val[0] == '\'') { char delim = val[0]; char *end = last_char_is(val + 1, delim); if (end) { *end = '\0'; val++; userdef_optflag.flags = OPTION_STRING; goto case_OPTION_STRING; } } /* No: hex-str option, handled in attach_option() */ opt = val; retval = 1; break; default: break; } if (retval) attach_option(opt_list, optflag, opt, length, dhcpv6); } while (retval && (optflag->flags & OPTION_LIST)); return retval; }
+Info
0
int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg, const struct dhcp_optflag *optflags, const char *option_strings, bool dhcpv6) { struct option_set **opt_list = arg; char *opt; char *str; const struct dhcp_optflag *optflag; struct dhcp_optflag userdef_optflag; unsigned optcode; int retval; /* IP_PAIR needs 8 bytes, STATIC_ROUTES needs 9 max */ char buffer[9] ALIGNED(4); uint16_t *result_u16 = (uint16_t *) buffer; uint32_t *result_u32 = (uint32_t *) buffer; /* Cheat, the only *const* str possible is "" */ str = (char *) const_str; opt = strtok(str, " \t=:"); if (!opt) return 0; optcode = bb_strtou(opt, NULL, 0); if (!errno && optcode < 255) { /* Raw (numeric) option code. * Initially assume binary (hex-str), but if "str" or 'str' * is seen later, switch to STRING. */ userdef_optflag.flags = OPTION_BIN; userdef_optflag.code = optcode; optflag = &userdef_optflag; } else { optflag = &optflags[udhcp_option_idx(opt, option_strings)]; } /* Loop to handle OPTION_LIST case, else execute just once */ retval = 0; do { int length; char *val; if (optflag->flags == OPTION_BIN) { val = strtok(NULL, ""); /* do not split "'q w e'" */ trim(val); } else val = strtok(NULL, ", \t"); if (!val) break; length = dhcp_option_lengths[optflag->flags & OPTION_TYPE_MASK]; retval = 0; opt = buffer; /* new meaning for variable opt */ switch (optflag->flags & OPTION_TYPE_MASK) { case OPTION_IP: retval = udhcp_str2nip(val, buffer); break; case OPTION_IP_PAIR: retval = udhcp_str2nip(val, buffer); val = strtok(NULL, ", \t/-"); if (!val) retval = 0; if (retval) retval = udhcp_str2nip(val, buffer + 4); break; case_OPTION_STRING: case OPTION_STRING: case OPTION_STRING_HOST: #if ENABLE_FEATURE_UDHCP_RFC3397 case OPTION_DNS_STRING: #endif length = strnlen(val, 254); if (length > 0) { opt = val; retval = 1; } break; case OPTION_U8: buffer[0] = bb_strtou32(val, NULL, 0); retval = (errno == 0); break; /* htonX are macros in older libc's, using temp var * in code below for safety */ /* TODO: use bb_strtoX? */ case OPTION_U16: { uint32_t tmp = bb_strtou32(val, NULL, 0); *result_u16 = htons(tmp); retval = (errno == 0 /*&& tmp < 0x10000*/); break; } case OPTION_U32: { uint32_t tmp = bb_strtou32(val, NULL, 0); *result_u32 = htonl(tmp); retval = (errno == 0); break; } case OPTION_S32: { int32_t tmp = bb_strtoi32(val, NULL, 0); *result_u32 = htonl(tmp); retval = (errno == 0); break; } case OPTION_STATIC_ROUTES: { /* Input: "a.b.c.d/m" */ /* Output: mask(1 byte),pfx(0-4 bytes),gw(4 bytes) */ unsigned mask; char *slash = strchr(val, '/'); if (slash) { *slash = '\0'; retval = udhcp_str2nip(val, buffer + 1); buffer[0] = mask = bb_strtou(slash + 1, NULL, 10); val = strtok(NULL, ", \t/-"); if (!val || mask > 32 || errno) retval = 0; if (retval) { length = ((mask + 7) >> 3) + 5; retval = udhcp_str2nip(val, buffer + (length - 4)); } } break; } case OPTION_BIN: /* Raw (numeric) option code. Is it a string? */ if (val[0] == '"' || val[0] == '\'') { char delim = val[0]; char *end = last_char_is(val + 1, delim); if (end) { *end = '\0'; val++; userdef_optflag.flags = OPTION_STRING; goto case_OPTION_STRING; } } /* No: hex-str option, handled in attach_option() */ opt = val; retval = 1; break; default: break; } if (retval) attach_option(opt_list, optflag, opt, length, dhcpv6); } while (retval && (optflag->flags & OPTION_LIST)); return retval; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,986
static void add_client_options(struct dhcp_packet *packet) { int i, end, len; udhcp_add_simple_option(packet, DHCP_MAX_SIZE, htons(IP_UDP_DHCP_SIZE)); /* Add a "param req" option with the list of options we'd like to have * from stubborn DHCP servers. Pull the data from the struct in common.c. * No bounds checking because it goes towards the head of the packet. */ end = udhcp_end_option(packet->options); len = 0; for (i = 1; i < DHCP_END; i++) { if (client_config.opt_mask[i >> 3] & (1 << (i & 7))) { packet->options[end + OPT_DATA + len] = i; len++; } } if (len) { packet->options[end + OPT_CODE] = DHCP_PARAM_REQ; packet->options[end + OPT_LEN] = len; packet->options[end + OPT_DATA + len] = DHCP_END; } if (client_config.vendorclass) udhcp_add_binary_option(packet, client_config.vendorclass); if (client_config.hostname) udhcp_add_binary_option(packet, client_config.hostname); if (client_config.fqdn) udhcp_add_binary_option(packet, client_config.fqdn); /* Request broadcast replies if we have no IP addr */ if ((option_mask32 & OPT_B) && packet->ciaddr == 0) packet->flags |= htons(BROADCAST_FLAG); /* Add -x options if any */ { struct option_set *curr = client_config.options; while (curr) { udhcp_add_binary_option(packet, curr->data); curr = curr->next; } } }
+Info
0
static void add_client_options(struct dhcp_packet *packet) { int i, end, len; udhcp_add_simple_option(packet, DHCP_MAX_SIZE, htons(IP_UDP_DHCP_SIZE)); /* Add a "param req" option with the list of options we'd like to have * from stubborn DHCP servers. Pull the data from the struct in common.c. * No bounds checking because it goes towards the head of the packet. */ end = udhcp_end_option(packet->options); len = 0; for (i = 1; i < DHCP_END; i++) { if (client_config.opt_mask[i >> 3] & (1 << (i & 7))) { packet->options[end + OPT_DATA + len] = i; len++; } } if (len) { packet->options[end + OPT_CODE] = DHCP_PARAM_REQ; packet->options[end + OPT_LEN] = len; packet->options[end + OPT_DATA + len] = DHCP_END; } if (client_config.vendorclass) udhcp_add_binary_option(packet, client_config.vendorclass); if (client_config.hostname) udhcp_add_binary_option(packet, client_config.hostname); if (client_config.fqdn) udhcp_add_binary_option(packet, client_config.fqdn); /* Request broadcast replies if we have no IP addr */ if ((option_mask32 & OPT_B) && packet->ciaddr == 0) packet->flags |= htons(BROADCAST_FLAG); /* Add -x options if any */ { struct option_set *curr = client_config.options; while (curr) { udhcp_add_binary_option(packet, curr->data); curr = curr->next; } } }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,987
static uint8_t* alloc_dhcp_option(int code, const char *str, int extra) { uint8_t *storage; int len = strnlen(str, 255); storage = xzalloc(len + extra + OPT_DATA); storage[OPT_CODE] = code; storage[OPT_LEN] = len + extra; memcpy(storage + extra + OPT_DATA, str, len); return storage; }
+Info
0
static uint8_t* alloc_dhcp_option(int code, const char *str, int extra) { uint8_t *storage; int len = strnlen(str, 255); storage = xzalloc(len + extra + OPT_DATA); storage[OPT_CODE] = code; storage[OPT_LEN] = len + extra; memcpy(storage + extra + OPT_DATA, str, len); return storage; }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,988
static int bcast_or_ucast(struct dhcp_packet *packet, uint32_t ciaddr, uint32_t server) { if (server) return udhcp_send_kernel_packet(packet, ciaddr, CLIENT_PORT, server, SERVER_PORT); return raw_bcast_from_client_config_ifindex(packet, ciaddr); }
+Info
0
static int bcast_or_ucast(struct dhcp_packet *packet, uint32_t ciaddr, uint32_t server) { if (server) return udhcp_send_kernel_packet(packet, ciaddr, CLIENT_PORT, server, SERVER_PORT); return raw_bcast_from_client_config_ifindex(packet, ciaddr); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,989
static void change_listen_mode(int new_mode) { log1("entering listen mode: %s", new_mode != LISTEN_NONE ? (new_mode == LISTEN_KERNEL ? "kernel" : "raw") : "none" ); listen_mode = new_mode; if (sockfd >= 0) { close(sockfd); sockfd = -1; } if (new_mode == LISTEN_KERNEL) sockfd = udhcp_listen_socket(/*INADDR_ANY,*/ CLIENT_PORT, client_config.interface); else if (new_mode != LISTEN_NONE) sockfd = udhcp_raw_socket(client_config.ifindex); /* else LISTEN_NONE: sockfd stays closed */ }
+Info
0
static void change_listen_mode(int new_mode) { log1("entering listen mode: %s", new_mode != LISTEN_NONE ? (new_mode == LISTEN_KERNEL ? "kernel" : "raw") : "none" ); listen_mode = new_mode; if (sockfd >= 0) { close(sockfd); sockfd = -1; } if (new_mode == LISTEN_KERNEL) sockfd = udhcp_listen_socket(/*INADDR_ANY,*/ CLIENT_PORT, client_config.interface); else if (new_mode != LISTEN_NONE) sockfd = udhcp_raw_socket(client_config.ifindex); /* else LISTEN_NONE: sockfd stays closed */ }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,990
static void client_background(void) { bb_daemonize(0); logmode &= ~LOGMODE_STDIO; /* rewrite pidfile, as our pid is different now */ write_pidfile(client_config.pidfile); }
+Info
0
static void client_background(void) { bb_daemonize(0); logmode &= ~LOGMODE_STDIO; /* rewrite pidfile, as our pid is different now */ write_pidfile(client_config.pidfile); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,991
static int good_hostname(const char *name) { for (;;) { name = valid_domain_label(name); if (!name) return 0; if (!name[0]) return 1; name++; if (*name == '\0') return 1; // We allow trailing dot too } }
+Info
0
static int good_hostname(const char *name) { for (;;) { name = valid_domain_label(name); if (!name) return 0; if (!name[0]) return 1; name++; if (*name == '\0') return 1; // We allow trailing dot too } }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,992
static void init_packet(struct dhcp_packet *packet, char type) { uint16_t secs; /* Fill in: op, htype, hlen, cookie fields; message type option: */ udhcp_init_header(packet, type); packet->xid = random_xid(); client_config.last_secs = monotonic_sec(); if (client_config.first_secs == 0) client_config.first_secs = client_config.last_secs; secs = client_config.last_secs - client_config.first_secs; packet->secs = htons(secs); memcpy(packet->chaddr, client_config.client_mac, 6); if (client_config.clientid) udhcp_add_binary_option(packet, client_config.clientid); }
+Info
0
static void init_packet(struct dhcp_packet *packet, char type) { uint16_t secs; /* Fill in: op, htype, hlen, cookie fields; message type option: */ udhcp_init_header(packet, type); packet->xid = random_xid(); client_config.last_secs = monotonic_sec(); if (client_config.first_secs == 0) client_config.first_secs = client_config.last_secs; secs = client_config.last_secs - client_config.first_secs; packet->secs = htons(secs); memcpy(packet->chaddr, client_config.client_mac, 6); if (client_config.clientid) udhcp_add_binary_option(packet, client_config.clientid); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,993
static int mton(uint32_t mask) { int i = 0; mask = ntohl(mask); /* 111110000-like bit pattern */ while (mask) { i++; mask <<= 1; } return i; }
+Info
0
static int mton(uint32_t mask) { int i = 0; mask = ntohl(mask); /* 111110000-like bit pattern */ while (mask) { i++; mask <<= 1; } return i; }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,994
static void perform_renew(void) { bb_error_msg("performing DHCP renew"); switch (state) { case BOUND: change_listen_mode(LISTEN_KERNEL); case RENEWING: case REBINDING: state = RENEW_REQUESTED; break; case RENEW_REQUESTED: /* impatient are we? fine, square 1 */ udhcp_run_script(NULL, "deconfig"); case REQUESTING: case RELEASED: change_listen_mode(LISTEN_RAW); state = INIT_SELECTING; break; case INIT_SELECTING: break; } }
+Info
0
static void perform_renew(void) { bb_error_msg("performing DHCP renew"); switch (state) { case BOUND: change_listen_mode(LISTEN_KERNEL); case RENEWING: case REBINDING: state = RENEW_REQUESTED; break; case RENEW_REQUESTED: /* impatient are we? fine, square 1 */ udhcp_run_script(NULL, "deconfig"); case REQUESTING: case RELEASED: change_listen_mode(LISTEN_RAW); state = INIT_SELECTING; break; case INIT_SELECTING: break; } }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,995
static int raw_bcast_from_client_config_ifindex(struct dhcp_packet *packet, uint32_t src_nip) { return udhcp_send_raw_packet(packet, /*src*/ src_nip, CLIENT_PORT, /*dst*/ INADDR_BROADCAST, SERVER_PORT, MAC_BCAST_ADDR, client_config.ifindex); }
+Info
0
static int raw_bcast_from_client_config_ifindex(struct dhcp_packet *packet, uint32_t src_nip) { return udhcp_send_raw_packet(packet, /*src*/ src_nip, CLIENT_PORT, /*dst*/ INADDR_BROADCAST, SERVER_PORT, MAC_BCAST_ADDR, client_config.ifindex); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,996
static NOINLINE int send_decline(/*uint32_t xid,*/ uint32_t server, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDECLINE); #if 0 /* RFC 2131 says DHCPDECLINE's xid is randomly selected by client, * but in case the server is buggy and wants DHCPDECLINE's xid * to match the xid which started entire handshake, * we use the same xid we used in initial DHCPDISCOVER: */ packet.xid = xid; #endif /* DHCPDECLINE uses "requested ip", not ciaddr, to store offered IP */ udhcp_add_simple_option(&packet, DHCP_REQUESTED_IP, requested); udhcp_add_simple_option(&packet, DHCP_SERVER_ID, server); bb_error_msg("sending %s", "decline"); return raw_bcast_from_client_config_ifindex(&packet, INADDR_ANY); }
+Info
0
static NOINLINE int send_decline(/*uint32_t xid,*/ uint32_t server, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDECLINE); #if 0 /* RFC 2131 says DHCPDECLINE's xid is randomly selected by client, * but in case the server is buggy and wants DHCPDECLINE's xid * to match the xid which started entire handshake, * we use the same xid we used in initial DHCPDISCOVER: */ packet.xid = xid; #endif /* DHCPDECLINE uses "requested ip", not ciaddr, to store offered IP */ udhcp_add_simple_option(&packet, DHCP_REQUESTED_IP, requested); udhcp_add_simple_option(&packet, DHCP_SERVER_ID, server); bb_error_msg("sending %s", "decline"); return raw_bcast_from_client_config_ifindex(&packet, INADDR_ANY); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,997
static NOINLINE int send_discover(uint32_t xid, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr fields, * random xid field (we override it below), * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDISCOVER); packet.xid = xid; if (requested) udhcp_add_simple_option(&packet, DHCP_REQUESTED_IP, requested); /* Add options: maxsize, * optionally: hostname, fqdn, vendorclass, * "param req" option according to -O, options specified with -x */ add_client_options(&packet); bb_error_msg("sending %s", "discover"); return raw_bcast_from_client_config_ifindex(&packet, INADDR_ANY); }
+Info
0
static NOINLINE int send_discover(uint32_t xid, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr fields, * random xid field (we override it below), * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDISCOVER); packet.xid = xid; if (requested) udhcp_add_simple_option(&packet, DHCP_REQUESTED_IP, requested); /* Add options: maxsize, * optionally: hostname, fqdn, vendorclass, * "param req" option according to -O, options specified with -x */ add_client_options(&packet); bb_error_msg("sending %s", "discover"); return raw_bcast_from_client_config_ifindex(&packet, INADDR_ANY); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,998
int send_release(uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPRELEASE); /* DHCPRELEASE uses ciaddr, not "requested ip", to store IP being released */ packet.ciaddr = ciaddr; udhcp_add_simple_option(&packet, DHCP_SERVER_ID, server); bb_error_msg("sending %s", "release"); /* Note: normally we unicast here since "server" is not zero. * However, there _are_ people who run "address-less" DHCP servers, * and reportedly ISC dhcp client and Windows allow that. */ return bcast_or_ucast(&packet, ciaddr, server); }
+Info
0
int send_release(uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPRELEASE); /* DHCPRELEASE uses ciaddr, not "requested ip", to store IP being released */ packet.ciaddr = ciaddr; udhcp_add_simple_option(&packet, DHCP_SERVER_ID, server); bb_error_msg("sending %s", "release"); /* Note: normally we unicast here since "server" is not zero. * However, there _are_ people who run "address-less" DHCP servers, * and reportedly ISC dhcp client and Windows allow that. */ return bcast_or_ucast(&packet, ciaddr, server); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null
6,999
static NOINLINE int send_renew(uint32_t xid, uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; struct in_addr temp_addr; /* * RFC 2131 4.3.2 DHCPREQUEST message * ... * DHCPREQUEST generated during RENEWING state: * * 'server identifier' MUST NOT be filled in, 'requested IP address' * option MUST NOT be filled in, 'ciaddr' MUST be filled in with * client's IP address. In this situation, the client is completely * configured, and is trying to extend its lease. This message will * be unicast, so no relay agents will be involved in its * transmission. Because 'giaddr' is therefore not filled in, the * DHCP server will trust the value in 'ciaddr', and use it when * replying to the client. */ /* Fill in: op, htype, hlen, cookie, chaddr fields, * random xid field (we override it below), * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPREQUEST); packet.xid = xid; packet.ciaddr = ciaddr; /* Add options: maxsize, * optionally: hostname, fqdn, vendorclass, * "param req" option according to -O, and options specified with -x */ add_client_options(&packet); temp_addr.s_addr = server; bb_error_msg("sending renew to %s", inet_ntoa(temp_addr)); return bcast_or_ucast(&packet, ciaddr, server); }
+Info
0
static NOINLINE int send_renew(uint32_t xid, uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; struct in_addr temp_addr; /* * RFC 2131 4.3.2 DHCPREQUEST message * ... * DHCPREQUEST generated during RENEWING state: * * 'server identifier' MUST NOT be filled in, 'requested IP address' * option MUST NOT be filled in, 'ciaddr' MUST be filled in with * client's IP address. In this situation, the client is completely * configured, and is trying to extend its lease. This message will * be unicast, so no relay agents will be involved in its * transmission. Because 'giaddr' is therefore not filled in, the * DHCP server will trust the value in 'ciaddr', and use it when * replying to the client. */ /* Fill in: op, htype, hlen, cookie, chaddr fields, * random xid field (we override it below), * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPREQUEST); packet.xid = xid; packet.ciaddr = ciaddr; /* Add options: maxsize, * optionally: hostname, fqdn, vendorclass, * "param req" option according to -O, and options specified with -x */ add_client_options(&packet); temp_addr.s_addr = server; bb_error_msg("sending renew to %s", inet_ntoa(temp_addr)); return bcast_or_ucast(&packet, ciaddr, server); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: make things like "$ip/$mask" possible */ uint32_t subnet; move_from_unaligned32(subnet, temp);
CWE-125
null
null