From: Michael Roth <mdroth@linux.vnet.ibm.com>
To: Don Koch <dkoch@verizon.com>, "Michael S. Tsirkin" <mst@redhat.com>
Cc: Peter Maydell <peter.maydell@linaro.org>,
qemu-devel@nongnu.org, qemu-stable@nongnu.org
Subject: Re: [Qemu-devel] [PATCH 15/23] pxa2xx: avoid buffer overrun on incoming migration
Date: Tue, 03 Dec 2013 14:56:05 -0600 [thread overview]
Message-ID: <20131203205605.661.29908@loki> (raw)
In-Reply-To: <529E3510.7030101@terremark.com>
Quoting Don Koch (2013-12-03 13:46:24)
> On 12/03/2013 11:29 AM, Michael S. Tsirkin wrote:
> > From: Michael Roth <mdroth@linux.vnet.ibm.com>
> >
> > CVE-2013-4533
> >
> > s->rx_level is read from the wire and used to determine how many bytes
> > to subsequently read into s->rx_fifo[]. If s->rx_level exceeds the
> > length of s->rx_fifo[] the buffer can be overrun with arbitrary data
> > from the wire.
> >
> > Fix this by introducing a constant, RX_FIFO_SZ, that defines the length
> > of s->rx_fifo[], and taking the wire value modulo RX_FIFO_SZ (as is done
> > elsewhere in the emulation code when s->rx_level exceeds RX_FIFO_SZ).
> >
> > Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
> > Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
> > ---
> > hw/arm/pxa2xx.c | 6 ++++--
> > 1 file changed, 4 insertions(+), 2 deletions(-)
> >
> > diff --git a/hw/arm/pxa2xx.c b/hw/arm/pxa2xx.c
> > index 02b7016..41d3c39 100644
> > --- a/hw/arm/pxa2xx.c
> > +++ b/hw/arm/pxa2xx.c
> > @@ -457,6 +457,8 @@ static const VMStateDescription vmstate_pxa2xx_mm = {
> > }
> > };
> >
> > +#define RX_FIFO_SZ 16
> > +
> > #define TYPE_PXA2XX_SSP "pxa2xx-ssp"
> > #define PXA2XX_SSP(obj) \
> > OBJECT_CHECK(PXA2xxSSPState, (obj), TYPE_PXA2XX_SSP)
> > @@ -481,7 +483,7 @@ typedef struct {
> > uint8_t ssrsa;
> > uint8_t ssacd;
> >
> > - uint32_t rx_fifo[16];
> > + uint32_t rx_fifo[RX_FIFO_SZ];
> > int rx_level;
> > int rx_start;
> > } PXA2xxSSPState;
> > @@ -756,7 +758,7 @@ static int pxa2xx_ssp_load(QEMUFile *f, void *opaque, int version_id)
> > qemu_get_8s(f, &s->ssrsa);
> > qemu_get_8s(f, &s->ssacd);
> >
> > - s->rx_level = qemu_get_byte(f);
> > + s->rx_level = qemu_get_byte(f) % RX_FIFO_SZ;
>
> This looks like it could leave garbage to be read in later. Why not
> check for s->rx_level > RX_FIFO_SZ and return an error like the others?
When I looked at the code before it seemed like s->rx_level was a running index
into a circular buffer, but I see now it never gets incremented beyond 16:
if (s->enable) {
uint32_t readval;
readval = ssi_transfer(s->bus, value);
if (s->rx_level < 0x10) {
s->rx_fifo[(s->rx_start + s->rx_level ++) & 0xf] = readval;
} else {
s->sssr |= SSSR_ROR;
}
}
So it probably makes more sense to just fail migration if it exceeds 16. I
think that would also address the issue Peter pointed out.
>
> > s->rx_start = 0;
> > for (i = 0; i < s->rx_level; i ++)
> > s->rx_fifo[i] = qemu_get_byte(f);
> >
>
> -d
next prev parent reply other threads:[~2013-12-03 20:56 UTC|newest]
Thread overview: 53+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-12-03 16:28 [Qemu-devel] [PATCH 00/23] qemu state loading issues Michael S. Tsirkin
2013-12-03 16:28 ` [Qemu-devel] [PATCH 01/23] virtio-net: fix buffer overflow on invalid state load Michael S. Tsirkin
2013-12-03 18:47 ` Peter Maydell
2013-12-03 16:28 ` [Qemu-devel] [PATCH 02/23] virtio-net: out-of-bounds buffer write on load Michael S. Tsirkin
2013-12-03 19:25 ` Peter Maydell
2013-12-03 16:28 ` [Qemu-devel] [PATCH 03/23] virtio-net: out-of-bounds buffer write on invalid state load Michael S. Tsirkin
2013-12-03 16:28 ` [Qemu-devel] [PATCH 04/23] virtio: " Michael S. Tsirkin
2013-12-03 16:28 ` [Qemu-devel] [PATCH 05/23] ahci: fix buffer overrun " Michael S. Tsirkin
2013-12-03 16:28 ` [Qemu-devel] [PATCH 06/23] hpet: " Michael S. Tsirkin
2013-12-03 18:39 ` Peter Maydell
2013-12-03 16:28 ` [Qemu-devel] [PATCH 07/23] hw/pci/pcie_aer.c: fix buffer overruns " Michael S. Tsirkin
2013-12-03 18:30 ` Peter Maydell
2013-12-03 20:41 ` Michael S. Tsirkin
2013-12-03 20:59 ` Peter Maydell
2013-12-03 21:19 ` Eric Blake
2013-12-03 21:25 ` Peter Maydell
2013-12-04 8:40 ` Michael S. Tsirkin
2013-12-03 16:28 ` [Qemu-devel] [PATCH 08/23] pl022: fix buffer overun " Michael S. Tsirkin
2013-12-03 16:28 ` [Qemu-devel] [PATCH 09/23] target-arm/machine.c: fix buffer overflow " Michael S. Tsirkin
2013-12-03 17:16 ` Peter Maydell
2013-12-03 16:28 ` [Qemu-devel] [PATCH 10/23] stellaris_enet: avoid buffer overrun on incoming migration Michael S. Tsirkin
2013-12-03 20:23 ` Peter Maydell
2013-12-03 16:28 ` [Qemu-devel] [PATCH 11/23] stellaris_enet: avoid buffer overrun on incoming migration (part 2) Michael S. Tsirkin
2013-12-03 18:36 ` Peter Maydell
2013-12-03 20:19 ` Peter Maydell
2013-12-03 16:28 ` [Qemu-devel] [PATCH 12/23] stellaris_enet: avoid buffer orerrun on incoming migration (part 3) Michael S. Tsirkin
2013-12-03 20:22 ` Peter Maydell
2013-12-03 16:28 ` [Qemu-devel] [PATCH 13/23] virtio: avoid buffer overrun on incoming migration Michael S. Tsirkin
2013-12-03 16:28 ` [Qemu-devel] [PATCH 14/23] openpic: " Michael S. Tsirkin
2013-12-03 16:29 ` [Qemu-devel] [PATCH 15/23] pxa2xx: " Michael S. Tsirkin
2013-12-03 19:46 ` Don Koch
2013-12-03 20:56 ` Michael Roth [this message]
2013-12-03 19:48 ` Peter Maydell
2013-12-03 16:29 ` [Qemu-devel] [PATCH 16/23] virtio: validate num_sg when mapping Michael S. Tsirkin
2013-12-03 16:29 ` [Qemu-devel] [PATCH 17/23] ssi-sd: fix buffer overrun on invalid state load Michael S. Tsirkin
2013-12-03 16:29 ` [Qemu-devel] [PATCH 18/23] ssd0323: fix buffer overun " Michael S. Tsirkin
2013-12-03 19:30 ` Peter Maydell
2013-12-03 16:29 ` [Qemu-devel] [PATCH 19/23] tsc210x: fix buffer overrun " Michael S. Tsirkin
2014-03-06 19:41 ` Andreas Färber
2013-12-03 16:29 ` [Qemu-devel] [PATCH 20/23] zaurus: " Michael S. Tsirkin
2013-12-03 19:44 ` Peter Maydell
2013-12-03 16:29 ` [Qemu-devel] [PATCH 21/23] usb: sanity check setup_index+setup_len in post_load Michael S. Tsirkin
2013-12-03 16:29 ` [Qemu-devel] [PATCH 22/23] virtio-scsi: fix buffer overrun on invalid state load Michael S. Tsirkin
2013-12-03 18:19 ` Peter Maydell
2013-12-03 19:24 ` Paolo Bonzini
2014-03-06 18:30 ` Andreas Färber
2014-03-06 18:36 ` Michael S. Tsirkin
2014-03-06 19:40 ` Paolo Bonzini
2014-03-06 19:43 ` Peter Maydell
2013-12-03 16:29 ` [Qemu-devel] [PATCH 23/23] savevm: fix potential segfault on invalid state Michael S. Tsirkin
2014-03-06 18:24 ` Andreas Färber
2013-12-03 18:24 ` [Qemu-devel] [PATCH 00/23] qemu state loading issues Peter Maydell
2013-12-04 11:01 ` Michael S. Tsirkin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20131203205605.661.29908@loki \
--to=mdroth@linux.vnet.ibm.com \
--cc=dkoch@verizon.com \
--cc=mst@redhat.com \
--cc=peter.maydell@linaro.org \
--cc=qemu-devel@nongnu.org \
--cc=qemu-stable@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).