mailing list of musl libc
 help / color / mirror / code / Atom feed
From: Rich Felker <dalias@libc.org>
To: "Jₑₙₛ Gustedt" <jens.gustedt@inria.fr>
Cc: musl@lists.openwall.com
Subject: Re: [musl] changes for scanf in C23
Date: Mon, 29 May 2023 11:59:29 -0400	[thread overview]
Message-ID: <20230529155929.GV4163@brightrain.aerifal.cx> (raw)
In-Reply-To: <20230529123202.63f09fc2@inria.fr>

On Mon, May 29, 2023 at 12:32:02PM +0200, Jₑₙₛ Gustedt wrote:
> Hi,
> we already discussed this but it doesn't seem that we have come to a
> conclusion.
> 
> The problem is that for C23 semantics of several string to integer
> conversion functions change: a 'b' or 'B' that previously was the stop
> condition for integer parsing may become part of the integer
> string. This concerns all `scanf` and `strto` derivatives.
> 
> This is probably not a problem for most applications that parse
> strings to integers, but it could be in some situations, and in
> particular it could open vulnerabilities. E.g network addresses that
> are read with base `0` (musl does this at some point to allow to have
> decimal or hex strings) could be open to attacks, once people start
> using binary encodings for integers more often. Another scenario where
> this could lead to harm is automatically produced output that is
> automatically scanned, and where nobody previously took care of proper
> word boundaries.
> 
> My current idea is to have two sets of these functions, one that has
> the old semantics and one that has the new.

This was rejected already in the first proposal (thread here):

Message-ID: <20230503000045.GU4163@brightrain.aerifal.cx>
https://www.openwall.com/lists/musl/2023/05/03/1

    "There are not going to be different versions of scanf/strto*
    because there's just no way to do that in a conforming way..."

There are other reasons for this too that basically amount to not
repeating glibc mistakes.

At some point I proposed a way that we could do C-version-specific
behavior via branching on an extern defined by linking in c23+ mode,
if this is really necessary. This probably needs more thought to flesh
out a design that's robust and has the right properties and make sure
we don't do anything that locks us into future trouble.

However, as I've said before, C users have survived multiple repeated
incompatible changes of this form, including the same thing happening
with hex floats. Moreover, strto* already are permitted to accept
arbitrary additional implementation-defined sequences except in the C
locale, so there's only any change at all in the C locale. My leaning,
if the committee is going to make these kinds of incompatible changes,
is to say that applications just have to be prepared to deal with them
and do any additional validation they deem necessary to their usage
cases.

Rich

  reply	other threads:[~2023-05-29 15:59 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-05-29 10:32 Jₑₙₛ Gustedt
2023-05-29 15:59 ` Rich Felker [this message]
2023-05-29 19:10   ` Jₑₙₛ Gustedt
2023-08-26 20:58     ` Fangrui Song

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230529155929.GV4163@brightrain.aerifal.cx \
    --to=dalias@libc.org \
    --cc=jens.gustedt@inria.fr \
    --cc=musl@lists.openwall.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/musl/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).