[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9337.1258175307@turing-police.cc.vt.edu>
Date: Sat, 14 Nov 2009 00:08:27 -0500
From: Valdis.Kletnieks@...edu
To: daw-news@...erner.cs.berkeley.edu (David Wagner)
Cc: linux-kernel@...r.kernel.org
Subject: Re: [PATCH 3/4] security/selinux: decrement sizeof size in strncmp
On Sat, 14 Nov 2009 00:41:15 GMT, David Wagner said:
> 1) The particular code snippets under discussion here were of the
> form
> strncmp(foo, "constant", sizeof("constant"))
> And the proposal is to replace this code with
> strcmp(foo, "constant")
> Do you really mean to object to this proposal?
No, in that particular case strcmp() is Obviously Safe.
> 2) More generally, you seem to be concerned about bugs where one
> piece of code fails to '\0'-terminate a string, and another piece of
> code invokes some library function that relies upon '\0'-termination.
Exactly.
> That is not specifically a strcmp() issue; this is an issue with using
> any string library that assumes '\0'-termination, where the string is not
> '\0'-terminated. That's a much broader issue that should be addressed by
> other means.
I know that - which is why I asked Julia if Cocinelle is able to do anything
in this area. An awful lot of our \0-terminated strings end up that way
implicitly because somebody does a kzalloc() or bzero() of an entire
structure, which can be fragile if code is refactored.
By the same token, that implicit behavior means that it's probably quite
difficult for any programmatic correctness checkers to follow the behavior.
> Saying "strcmp() is bad" is a poor response to this risk.
I didn't say "strcmp() is bad". I said it needs auditing. The strn-
versions of functions have a guaranteed termination condition right there
in the call. For strcmp() and strcpy(), the termination guarantee is
often elsewhere, which is why code using them tends to be brittle and
is harder to audit.
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists