]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
Check return value of buf_move_to_buf for error.
authorTobias Stoeckmann <tobias@stoeckmann.org>
Sun, 31 Mar 2019 15:33:11 +0000 (17:33 +0200)
committerNick Mathewson <nickm@torproject.org>
Tue, 9 Apr 2019 16:05:22 +0000 (12:05 -0400)
If the concatenation of connection buffer and the buffer of linked
connection exceeds INT_MAX bytes, then buf_move_to_buf returns -1 as an
error value.

This value is currently casted to size_t (variable n_read) and will
erroneously lead to an increasement of variable "max_to_read".

This in turn can be used to call connection_buf_read_from_socket to
store more data inside the buffer than expected and clogging the
connection buffer.

If the linked connection buffer was able to overflow INT_MAX, the call
of buf_move_to_buf would have previously internally triggered an integer
overflow, corrupting the state of the connection buffer.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
src/or/connection.c

index 0a2a635096d7a3cbd4096e4e580174f0a2721827..f18ef74536f3fcd9841331c118264e7dfa5d8b96 100644 (file)
@@ -3561,6 +3561,10 @@ connection_buf_read_from_socket(connection_t *conn, ssize_t *max_to_read,
     if (conn->linked_conn) {
       result = buf_move_to_buf(conn->inbuf, conn->linked_conn->outbuf,
                                &conn->linked_conn->outbuf_flushlen);
+      if (BUG(result<0)) {
+        log_warn(LD_BUG, "reading from linked connection buffer failed.");
+        return -1;
+      }
     } else {
       result = 0;
     }