From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:41687) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1WVlnB-00015X-Rw for qemu-devel@nongnu.org; Thu, 03 Apr 2014 13:51:15 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1WVln5-0002Vp-K4 for qemu-devel@nongnu.org; Thu, 03 Apr 2014 13:51:09 -0400 Date: Thu, 3 Apr 2014 20:51:30 +0300 From: "Michael S. Tsirkin" Message-ID: <20140403175048.GA23811@redhat.com> References: <1396543778-22307-1-git-send-email-mst@redhat.com> <1396543778-22307-18-git-send-email-mst@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Subject: Re: [Qemu-devel] [PATCH v5 17/24] ssi-sd: fix buffer overrun on invalid state load List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Peter Maydell Cc: Kevin Wolf , Peter Crosthwaite , QEMU Developers , Michael Roth , qemu-stable , Andreas =?iso-8859-1?Q?F=E4rber?= , Dave Gilbert On Thu, Apr 03, 2014 at 06:05:03PM +0100, Peter Maydell wrote: > On 3 April 2014 17:52, Michael S. Tsirkin wrote: > > CVE-2013-4537 > > > > s->arglen is taken from wire and used as idx > > in ssi_sd_transfer(). > > > > Validate it before access. > > > > Signed-off-by: Michael S. Tsirkin > > --- > > hw/sd/ssi-sd.c | 8 ++++++++ > > 1 file changed, 8 insertions(+) > > > > diff --git a/hw/sd/ssi-sd.c b/hw/sd/ssi-sd.c > > index 3273c8a..2fa2b2b 100644 > > --- a/hw/sd/ssi-sd.c > > +++ b/hw/sd/ssi-sd.c > > @@ -230,6 +230,14 @@ static int ssi_sd_load(QEMUFile *f, void *opaque, int version_id) > > for (i = 0; i < 5; i++) > > s->response[i] = qemu_get_be32(f); > > s->arglen = qemu_get_be32(f); > > + if (s->mode == SSI_SD_CMDARG && > > + (s->arglen < 0 || s->arglen > ARRAY_SIZE(s->cmdarg))) { > > + return -EINVAL; > > + } > > + if (s->mode == SSI_SD_RESPONSE && > > + (s->response_pos < 0 || s->response_pos > ARRAY_SIZE(s->response))) { And actually it should be s->response_pos >= ARRAY_SIZE(s->response), right? > > + return -EINVAL; > > + } > > s->response_pos = qemu_get_be32(f); > > s->stopping = qemu_get_be32(f); > > Surely we should read s->response_pos off the wire before > validating it rather than after? > > Also, your checks on arglen aren't sufficient. Consider > the case where the attacker: > * sets mode to SSI_SD_RESPONSE > * sets arglen to something huge > * sets response_pos to 0 > * gets the guest to repeatedly provoke calls to ssi_sd_transfer > > We'll happily read off the end of the s->response[] buffer, > because our "when do we stop returning response bytes" check > is "s->response_pos >= s->arglen". > > thanks > -- PMM