From nobody Fri Feb 13 15:42:38 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 85633C04AAB for ; Fri, 22 Sep 2023 11:49:25 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233811AbjIVLt3 (ORCPT ); Fri, 22 Sep 2023 07:49:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40938 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229644AbjIVLt1 (ORCPT ); Fri, 22 Sep 2023 07:49:27 -0400 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 957C8102 for ; Fri, 22 Sep 2023 04:49:21 -0700 (PDT) Received: by mail-yb1-xb49.google.com with SMTP id 3f1490d57ef6-d81a76a11eeso2525667276.3 for ; Fri, 22 Sep 2023 04:49:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1695383361; x=1695988161; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=ZXyxGhzRige3UrB4+p+4v9PuPDCzdTgmyjbIDA5ZLsI=; b=OHfFpdVsqTbk1xz2ltjUuf82IirAGWVU6a0u5Vgr21Kn+p8XJRTIfJEsRLm2XwJKbB lkdEQX+AwDUtZZEQkp6YlQ9dBspKJ1XbrKyWZiasCwsCi1MmKzsVOmfpX771aiorKCBE M7Q9+OusHbrTtosDsw73g8IIR2CaKm03GUkCZWbneGiVCt/NkcehxyHmoxCkguuOK7nD qFIORvX26lrL3EYToac+HS6knwKgC9omN/9ee/gHPQq7FJBZiNhH5RfLAKP0wttnswMO CQKNRMv+qqOszeX3E5kRsn4sjxPwvU3rB6szVwqdkS1J89BFhLAwMfABfKFg7vyqcBtq FJQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695383361; x=1695988161; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=ZXyxGhzRige3UrB4+p+4v9PuPDCzdTgmyjbIDA5ZLsI=; b=EDOPTiwQnLpk0pHWizIToEg4q6D/y9OTWMq9M9SJc6WFMvj3S6axDLnkMUpiM2AwMx umTrCixh2/QWyLm8rChSHx8L/WgRvYWcitGXLwLwRo0sNQVQUQ7ADq/Sp1LWeDQB3KZu coavGdi/NkkPzkNphD3PODjgYOYMPcGvAnlLFLj4wjakUO0ZLz459OkZcx9r8nq1hRZJ /u1nZ2TPUJaJGFsJbYm4YvNIimrLCTVxurgNVBXIrO44/fKIRxYB9PEO+hlypHQ0k1Wm f6g8/44t/XeNB01KwqIdJxGmlp5zLR5k3ZzVy9MYXzWO1hBvQFznI2queTFbL+6ZjAU7 GtRA== X-Gm-Message-State: AOJu0YySb6JshKIlwJrrS/t7aoTzpVXYZZrQpqdTyStAq7hw6ptcJJIl NoX2CsLr5+RQCv+TlQMzFOeyI/14zhQPWzqpKg== X-Google-Smtp-Source: AGHT+IElfQgQT6wbMncjFiA2exW2yO6eLXVY/tVVnaY3Q2kjEceLwN/PBhRPZKSywO8cyHS5x88dUl2JI+F/ZL/jrQ== X-Received: from jstitt-linux1.c.googlers.com ([fda3:e722:ac3:cc00:2b:ff92:c0a8:23b5]) (user=justinstitt job=sendgmr) by 2002:a5b:7c5:0:b0:d7f:f3e:74ab with SMTP id t5-20020a5b07c5000000b00d7f0f3e74abmr127533ybq.1.1695383360879; Fri, 22 Sep 2023 04:49:20 -0700 (PDT) Date: Fri, 22 Sep 2023 11:49:14 +0000 Mime-Version: 1.0 X-B4-Tracking: v=1; b=H4sIADl/DWUC/x2NQQqDMBAAvyJ77oKJxmq/UjxIsmmXQgy7RRTx7 4ZcBuYyc4KSMCm8mhOENlZeUxHzaMB/l/Qh5FAcbGu7drIW9S/J5wOD8EaiyBoS+iUz/io9OjN E84xuGsYeSicLRd7r4z1f1w2gXhc0cwAAAA== X-Developer-Key: i=justinstitt@google.com; a=ed25519; pk=tC3hNkJQTpNX/gLKxTNQKDmiQl6QjBNCGKJINqAdJsE= X-Developer-Signature: v=1; a=ed25519-sha256; t=1695383359; l=2302; i=justinstitt@google.com; s=20230717; h=from:subject:message-id; bh=xmrjKIrKcccHwiQZLHhc+QD8XbzmyrFL8mHFb+Gfs4A=; b=qG0dzg9B6wVI/G86xbbk5dMi4zCmbwp8XMwL+vzCUiOwXjupj59HG/9MKVk0SHfEhICTweQTX Yx6PC25TXp1CgXLQZCRqikxujURFcztXUoBCmjwhvdV8dS45F85qshL X-Mailer: b4 0.12.3 Message-ID: <20230922-strncpy-drivers-isdn-capi-kcapi-c-v1-1-55fcf8b075fb@google.com> Subject: [PATCH] isdn: kcapi: replace deprecated strncpy with strscpy_pad From: Justin Stitt To: Karsten Keil Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org, Justin Stitt Content-Type: text/plain; charset="utf-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: quoted-printable `strncpy` is deprecated for use on NUL-terminated destination strings [1] and as such we should prefer more robust and less ambiguous string interfaces. `buf` is used in this context as a data buffer with 64 bytes of memory to be occupied by capi_manufakturer. We see the caller capi20_get_manufacturer() passes data.manufacturer as its `buf` argument which is then later passed over to user space. Due to this, let's keep the NUL-padding that strncpy provided by using strscpy_pad so as to not leak any stack data. | cdev->errcode =3D capi20_get_manufacturer(data.contr, data.manufacturer); | if (cdev->errcode) | return -EIO; | | if (copy_to_user(argp, data.manufacturer, | sizeof(data.manufacturer))) | return -EFAULT; Perhaps this would also be a good instance to use `strtomem_pad` for but in my testing the compiler was not able to determine the size of `buf` -- even with all the hints. Link: https://www.kernel.org/doc/html/latest/process/deprecated.html#strncp= y-on-nul-terminated-strings [1] Link: https://github.com/KSPP/linux/issues/90 Cc: linux-hardening@vger.kernel.org Signed-off-by: Justin Stitt Reviewed-by: Kees Cook --- Note: build-tested only. --- drivers/isdn/capi/kcapi.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/isdn/capi/kcapi.c b/drivers/isdn/capi/kcapi.c index ae24848af233..136ba9fe55e0 100644 --- a/drivers/isdn/capi/kcapi.c +++ b/drivers/isdn/capi/kcapi.c @@ -732,7 +732,7 @@ u16 capi20_get_manufacturer(u32 contr, u8 buf[CAPI_MANU= FACTURER_LEN]) u16 ret; =20 if (contr =3D=3D 0) { - strncpy(buf, capi_manufakturer, CAPI_MANUFACTURER_LEN); + strscpy_pad(buf, capi_manufakturer, CAPI_MANUFACTURER_LEN); return CAPI_NOERROR; } =20 @@ -740,7 +740,7 @@ u16 capi20_get_manufacturer(u32 contr, u8 buf[CAPI_MANU= FACTURER_LEN]) =20 ctr =3D get_capi_ctr_by_nr(contr); if (ctr && ctr->state =3D=3D CAPI_CTR_RUNNING) { - strncpy(buf, ctr->manu, CAPI_MANUFACTURER_LEN); + strscpy_pad(buf, ctr->manu, CAPI_MANUFACTURER_LEN); ret =3D CAPI_NOERROR; } else ret =3D CAPI_REGNOTINSTALLED; --- base-commit: 2cf0f715623872823a72e451243bbf555d10d032 change-id: 20230922-strncpy-drivers-isdn-capi-kcapi-c-516f17f59684 Best regards, -- Justin Stitt