lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1bcfe20e-0103-44a5-82b5-90cba7ba5a60@redhat.com>
Date: Thu, 5 Feb 2026 13:51:46 +0100
From: Paolo Abeni <pabeni@...hat.com>
To: Simon Horman <horms@...nel.org>, lucien.xin@...il.com
Cc: steved@...hat.com, marcelo.leitner@...il.com, aahringo@...hat.com,
 alibuda@...ux.alibaba.com, jbaron@...mai.com, hare@...e.de, kuba@...nel.org,
 tom@...pey.com, linux-cifs@...r.kernel.org, daniel@...x.se,
 quic@...ts.linux.dev, jlayton@...nel.org, tfanelli@...hat.com,
 dhowells@...hat.com, linkinjeon@...nel.org, hepengtao@...omi.com,
 pc@...guebit.com, kernel-tls-handshake@...ts.linux.dev,
 illiliti@...tonmail.com, xiyou.wangcong@...il.com,
 andrew.gospodarek@...adcom.com, mail@...nericson.me, edumazet@...gle.com,
 matttbe@...nel.org, netdev@...r.kernel.org, smfrench@...il.com,
 metze@...ba.org, mbuhl@...nbsd.org, chuck.lever@...cle.com,
 dreibh@...ula.no, davem@...emloft.net, sd@...asysnail.net
Subject: Re: [net-next,v9,03/15] quic: provide common utilities and data
 structures

On 2/5/26 12:54 PM, Simon Horman wrote:
> This is an AI-generated review of your patch. The human sending this
> email has considered the AI review valid, or at least plausible.
> 
> For local reproduction steps see https://netdev-ai.bots.linux.dev/ai-local.html
> ---
> quic: provide common utilities and data structures
> 
> This patch provides foundational data structures and utilities for
> the QUIC stack, including hash tables for socket lookup, connection
> ID management, and helpers for encoding/decoding transport parameters.
> 
>> diff --git a/net/quic/common.c b/net/quic/common.c
>> new file mode 100644
>> index 000000000000..94321f3f213d
>> --- /dev/null
>> +++ b/net/quic/common.c
> 
> [ ... ]
> 
>> +/* Reads a QUIC transport parameter value. */
>> +u8 quic_get_param(u64 *pdest, u8 **pp, u32 *plen)
>> +{
>> +	u64 valuelen;
>> +
>> +	if (!quic_get_var(pp, plen, &valuelen))
>> +		return 0;
>> +
>> +	if (*plen < valuelen)
>> +		return 0;
>> +
>> +	if (!quic_get_var(pp, plen, pdest))
>> +		return 0;
>> +
>> +	return (u8)valuelen;
>> +}
> 
> Does quic_get_param() need to verify that quic_get_var() consumed exactly
> valuelen bytes?
> 
> The function reads valuelen at the first quic_get_var() call, then decodes
> the value with the second quic_get_var(). However, quic_get_var() determines
> how many bytes to consume based on the varint prefix in the data, not from
> valuelen.
> 
> If a malformed packet has valuelen=2 but the varint encoding requires 4 bytes,
> quic_get_var() will consume 4 bytes while the function returns valuelen=2.
> This could desynchronize parsing of subsequent parameters since the caller
> expects the buffer to have advanced by valuelen bytes based on the return
> value.

Hard to tell without any caller for this function. Possibly you could
drop it? IDK if enforcing such check would be correct/safe from an
interoperability PoV.

>> diff --git a/net/quic/common.h b/net/quic/common.h
>> new file mode 100644
>> index 000000000000..bfec0aaf2907
>> --- /dev/null
>> +++ b/net/quic/common.h
> 
> [ ... ]
> 
>> +#define QUIC_CONN_ID_MAX_LEN	20
> 
> [ ... ]
> 
>> +struct quic_conn_id {
>> +	u8 data[QUIC_CONN_ID_MAX_LEN];
>> +	u8 len;
>> +};
>> +
>> +static inline void quic_conn_id_update(struct quic_conn_id *conn_id, u8 *data, u32 len)
>> +{
>> +	memcpy(conn_id->data, data, len);
>> +	conn_id->len = (u8)len;
>> +}
> 
> Should quic_conn_id_update() validate that len does not exceed
> QUIC_CONN_ID_MAX_LEN before the memcpy?
> 
> The destination buffer conn_id->data is a 20-byte array, but the len
> parameter is u32 with no bounds check. If a caller passes len > 20, the
> memcpy would overflow the buffer.

It looks like the check responsibility is on the callers. I guess it
would make things more robust and simpler move the check here.

/P


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ