Blame SOURCES/libcgroup-0.41-api.c-fix-potential-buffer-overflow.patch

973139
From 1b4b4b7f8d4443c3e630838c9b33c9a69fdb6193 Mon Sep 17 00:00:00 2001
973139
From: =?UTF-8?q?Nikola=20Forr=C3=B3?= <nforro@redhat.com>
973139
Date: Sun, 19 Jun 2016 17:12:01 +0200
973139
Subject: [PATCH] api.c: fix potential buffer overflow
973139
MIME-Version: 1.0
973139
Content-Type: text/plain; charset=UTF-8
973139
Content-Transfer-Encoding: 8bit
973139
973139
It is assumed that arguments read from /proc/<pid>/cmdline don't exceed
973139
buf_pname buffer size, which is FILENAME_MAX - 1 characters, but that's
973139
not always the case.
973139
973139
Add check to prevent buffer overflow and discard the excessive part of
973139
an argument.
973139
973139
Signed-off-by: Nikola Forró <nforro@redhat.com>
973139
---
973139
 src/api.c | 6 +++++-
973139
 1 file changed, 5 insertions(+), 1 deletion(-)
973139
973139
diff --git a/src/api.c b/src/api.c
973139
index b40364c..18ce21f 100644
973139
--- a/src/api.c
973139
+++ b/src/api.c
973139
@@ -4055,13 +4055,17 @@ static int cg_get_procname_from_proc_cmdline(pid_t pid,
973139
 
973139
 	while (c != EOF) {
973139
 		c = fgetc(f);
973139
-		if ((c != EOF) && (c != '\0')) {
973139
+		if ((c != EOF) && (c != '\0') && (len < FILENAME_MAX - 1)) {
973139
 			buf_pname[len] = c;
973139
 			len++;
973139
 			continue;
973139
 		}
973139
 		buf_pname[len] = '\0';
973139
 
973139
+		if (len == FILENAME_MAX - 1)
973139
+			while ((c != EOF) && (c != '\0'))
973139
+				c = fgetc(f);
973139
+
973139
 		/*
973139
 		 * The taken process name from /proc/<pid>/status is
973139
 		 * shortened to 15 characters if it is over. So the
973139
-- 
973139
2.7.4
973139