]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf
authorJoshua Rogers <linux@joshua.hu>
Wed, 31 Dec 2025 14:43:03 +0000 (09:43 -0500)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 19 Jan 2026 12:12:03 +0000 (13:12 +0100)
[ Upstream commit d4b69a6186b215d2dc1ebcab965ed88e8d41768d ]

A zero length gss_token results in pages == 0 and in_token->pages[0]
is NULL. The code unconditionally evaluates
page_address(in_token->pages[0]) for the initial memcpy, which can
dereference NULL even when the copy length is 0. Guard the first
memcpy so it only runs when length > 0.

Fixes: 5866efa8cbfb ("SUNRPC: Fix svcauth_gss_proxy_init()")
Cc: stable@vger.kernel.org
Signed-off-by: Joshua Rogers <linux@joshua.hu>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
[ adapted xdr buffer pointer API to older argv iov_base/iov_len API ]
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/sunrpc/auth_gss/svcauth_gss.c

index 329eac782cc5e07088994abeda91bb3e71a1cb3c..fe85762dbd96612b1e2178295ca7f070c0fd869b 100644 (file)
@@ -1177,7 +1177,8 @@ static int gss_read_proxy_verf(struct svc_rqst *rqstp,
        }
 
        length = min_t(unsigned int, inlen, argv->iov_len);
-       memcpy(page_address(in_token->pages[0]), argv->iov_base, length);
+       if (length)
+               memcpy(page_address(in_token->pages[0]), argv->iov_base, length);
        inlen -= length;
 
        to_offs = length;