From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:36512) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Vnvw3-0003Jg-Id for qemu-devel@nongnu.org; Tue, 03 Dec 2013 14:47:15 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Vnvvv-0008JI-GK for qemu-devel@nongnu.org; Tue, 03 Dec 2013 14:47:07 -0500 From: Don Koch Message-ID: <529E3510.7030101@terremark.com> Date: Tue, 3 Dec 2013 14:46:24 -0500 MIME-Version: 1.0 References: <1386087086-3691-1-git-send-email-mst@redhat.com> <1386087086-3691-16-git-send-email-mst@redhat.com> In-Reply-To: <1386087086-3691-16-git-send-email-mst@redhat.com> Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH 15/23] pxa2xx: avoid buffer overrun on incoming migration List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "Michael S. Tsirkin" Cc: Michael Roth , Peter Maydell , qemu-devel@nongnu.org, qemu-stable@nongnu.org On 12/03/2013 11:29 AM, Michael S. Tsirkin wrote: > From: Michael Roth > > CVE-2013-4533 > > s->rx_level is read from the wire and used to determine how many bytes > to subsequently read into s->rx_fifo[]. If s->rx_level exceeds the > length of s->rx_fifo[] the buffer can be overrun with arbitrary data > from the wire. > > Fix this by introducing a constant, RX_FIFO_SZ, that defines the length > of s->rx_fifo[], and taking the wire value modulo RX_FIFO_SZ (as is done > elsewhere in the emulation code when s->rx_level exceeds RX_FIFO_SZ). > > Signed-off-by: Michael Roth > Signed-off-by: Michael S. Tsirkin > --- > hw/arm/pxa2xx.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/hw/arm/pxa2xx.c b/hw/arm/pxa2xx.c > index 02b7016..41d3c39 100644 > --- a/hw/arm/pxa2xx.c > +++ b/hw/arm/pxa2xx.c > @@ -457,6 +457,8 @@ static const VMStateDescription vmstate_pxa2xx_mm = { > } > }; > > +#define RX_FIFO_SZ 16 > + > #define TYPE_PXA2XX_SSP "pxa2xx-ssp" > #define PXA2XX_SSP(obj) \ > OBJECT_CHECK(PXA2xxSSPState, (obj), TYPE_PXA2XX_SSP) > @@ -481,7 +483,7 @@ typedef struct { > uint8_t ssrsa; > uint8_t ssacd; > > - uint32_t rx_fifo[16]; > + uint32_t rx_fifo[RX_FIFO_SZ]; > int rx_level; > int rx_start; > } PXA2xxSSPState; > @@ -756,7 +758,7 @@ static int pxa2xx_ssp_load(QEMUFile *f, void *opaque, int version_id) > qemu_get_8s(f, &s->ssrsa); > qemu_get_8s(f, &s->ssacd); > > - s->rx_level = qemu_get_byte(f); > + s->rx_level = qemu_get_byte(f) % RX_FIFO_SZ; This looks like it could leave garbage to be read in later. Why not check for s->rx_level > RX_FIFO_SZ and return an error like the others? > s->rx_start = 0; > for (i = 0; i < s->rx_level; i ++) > s->rx_fifo[i] = qemu_get_byte(f); > -d