linux/net/sunrpc/auth_gss
Martijn de Gouw 6498597aeb SUNRPC: fix copying of multiple pages in gss_read_proxy_verf()
[ Upstream commit d48c812474 ]

When the passed token is longer than 4032 bytes, the remaining part
of the token must be copied from the rqstp->rq_arg.pages. But the
copy must make sure it happens in a consecutive way.

With the existing code, the first memcpy copies 'length' bytes from
argv->iobase, but since the header is in front, this never fills the
whole first page of in_token->pages.

The mecpy in the loop copies the following bytes, but starts writing at
the next page of in_token->pages.  This leaves the last bytes of page 0
unwritten.

Symptoms were that users with many groups were not able to access NFS
exports, when using Active Directory as the KDC.

Signed-off-by: Martijn de Gouw <martijn.de.gouw@prodrive-technologies.com>
Fixes: 5866efa8cb "SUNRPC: Fix svcauth_gss_proxy_init()"
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2020-10-29 09:57:56 +01:00
..
Makefile
auth_gss.c SUNRPC: Fix GSS privacy computation of auth->au_ralign 2020-05-20 08:20:05 +02:00
gss_generic_token.c
gss_krb5_crypto.c SUNRPC: Add "@len" parameter to gss_unwrap() 2020-05-20 08:20:04 +02:00
gss_krb5_keys.c
gss_krb5_mech.c
gss_krb5_seal.c
gss_krb5_seqnum.c
gss_krb5_unseal.c
gss_krb5_wrap.c SUNRPC: Fix ("SUNRPC: Add "@len" parameter to gss_unwrap()") 2020-08-19 08:16:21 +02:00
gss_mech_switch.c sunrpc: clean up properly in gss_mech_unregister() 2020-06-22 09:31:24 +02:00
gss_rpc_upcall.c
gss_rpc_upcall.h
gss_rpc_xdr.c
gss_rpc_xdr.h
svcauth_gss.c SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() 2020-10-29 09:57:56 +01:00
trace.c