From: Pawel Wieczorkiewicz <wipawel@amazon.de>
To: xen-devel@lists.xen.org
Cc: jgross@suse.com, wei.liu2@citrix.com, julien.grall@linaro.org,
ian.jackson@eu.citrix.com, mpohlack@amazon.de,
Pawel Wieczorkiewicz <wipawel@amazon.de>,
doebel@amazon.de
Subject: [PATCH] tools/xenstored: Check number of strings passed to do_control()
Date: Fri, 27 Oct 2017 16:32:15 +0000 [thread overview]
Message-ID: <1509121935-41889-1-git-send-email-wipawel@amazon.de> (raw)
It is possible to send a zero-string message body to xenstore's
XS_CONTROL handling function. Then the number of strings is used
for an array allocation. This leads to a crash in strcmp() in a
CONTROL sub-command invocation loop.
The output of xs_count_string() should be verified and all 0 or
negative values should be rejected with an EINVAL. At least the
sub-command name must be specified.
The xenstore crash can only be triggered from within dom0 (there
is a check in do_control() rejecting all non-dom0 requests with
an EACCES).
Testing: reproduced with the following command:
python -c 'print 16*"\x00"' | nc -U $XENSTORED_RUNDIR/socket
Signed-off-by: Pawel Wieczorkiewicz <wipawel@amazon.de>
Reviewed-by: Martin Pohlack <mpohlack@amazon.de>
---
tools/xenstore/xenstored_control.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/xenstore/xenstored_control.c b/tools/xenstore/xenstored_control.c
index 7c14911..e4b8aa9 100644
--- a/tools/xenstore/xenstored_control.c
+++ b/tools/xenstore/xenstored_control.c
@@ -184,6 +184,8 @@ int do_control(struct connection *conn, struct buffered_data *in)
return EACCES;
num = xs_count_strings(in->buffer, in->used);
+ if (num < 1)
+ return EINVAL;
vec = talloc_array(in, char *, num);
if (!vec)
return ENOMEM;
--
1.8.3.1
Amazon Development Center Germany GmbH
Berlin - Dresden - Aachen
main office: Krausenstr. 38, 10117 Berlin
Geschaeftsfuehrer: Dr. Ralf Herbrich, Christian Schlaeger
Ust-ID: DE289237879
Eingetragen am Amtsgericht Charlottenburg HRB 149173 B
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next reply other threads:[~2017-10-27 16:32 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-27 16:32 Pawel Wieczorkiewicz [this message]
2017-10-27 16:37 ` [PATCH for-4.10] tools/xenstored: Check number of strings passed to do_control() Ian Jackson
2017-11-13 16:03 ` Julien Grall
2017-10-27 17:21 ` [PATCH] " Juergen Gross
2017-10-30 16:32 ` Wei Liu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1509121935-41889-1-git-send-email-wipawel@amazon.de \
--to=wipawel@amazon.de \
--cc=doebel@amazon.de \
--cc=ian.jackson@eu.citrix.com \
--cc=jgross@suse.com \
--cc=julien.grall@linaro.org \
--cc=mpohlack@amazon.de \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).