4d7edd7
From: Li Qiang <liqiang6-s@360.cn>
4d7edd7
Date: Tue, 1 Nov 2016 12:00:40 +0100
4d7edd7
Subject: [PATCH] 9pfs: fix integer overflow issue in xattr read/write
4d7edd7
MIME-Version: 1.0
4d7edd7
Content-Type: text/plain; charset=UTF-8
4d7edd7
Content-Transfer-Encoding: 8bit
4d7edd7
4d7edd7
The v9fs_xattr_read() and v9fs_xattr_write() are passed a guest
4d7edd7
originated offset: they must ensure this offset does not go beyond
4d7edd7
the size of the extended attribute that was set in v9fs_xattrcreate().
4d7edd7
Unfortunately, the current code implement these checks with unsafe
4d7edd7
calculations on 32 and 64 bit values, which may allow a malicious
4d7edd7
guest to cause OOB access anyway.
4d7edd7
4d7edd7
Fix this by comparing the offset and the xattr size, which are
4d7edd7
both uint64_t, before trying to compute the effective number of bytes
4d7edd7
to read or write.
4d7edd7
4d7edd7
Suggested-by: Greg Kurz <groug@kaod.org>
4d7edd7
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
4d7edd7
Reviewed-by: Greg Kurz <groug@kaod.org>
4d7edd7
Reviewed-By: Guido G√ľnther <agx@sigxcpu.org>
4d7edd7
Signed-off-by: Greg Kurz <groug@kaod.org>
4d7edd7
(cherry picked from commit 7e55d65c56a03dcd2c5d7c49d37c5a74b55d4bd6)
4d7edd7
---
4d7edd7
 hw/9pfs/9p.c | 32 ++++++++++++--------------------
4d7edd7
 1 file changed, 12 insertions(+), 20 deletions(-)
4d7edd7
4d7edd7
diff --git a/hw/9pfs/9p.c b/hw/9pfs/9p.c
4d7edd7
index 22690f2..5126459 100644
4d7edd7
--- a/hw/9pfs/9p.c
4d7edd7
+++ b/hw/9pfs/9p.c
4d7edd7
@@ -1627,20 +1627,17 @@ static int v9fs_xattr_read(V9fsState *s, V9fsPDU *pdu, V9fsFidState *fidp,
4d7edd7
 {
4d7edd7
     ssize_t err;
4d7edd7
     size_t offset = 7;
4d7edd7
-    int read_count;
4d7edd7
-    int64_t xattr_len;
4d7edd7
+    uint64_t read_count;
4d7edd7
     V9fsVirtioState *v = container_of(s, V9fsVirtioState, state);
4d7edd7
     VirtQueueElement *elem = v->elems[pdu->idx];
4d7edd7
 
4d7edd7
-    xattr_len = fidp->fs.xattr.len;
4d7edd7
-    read_count = xattr_len - off;
4d7edd7
+    if (fidp->fs.xattr.len < off) {
4d7edd7
+        read_count = 0;
4d7edd7
+    } else {
4d7edd7
+        read_count = fidp->fs.xattr.len - off;
4d7edd7
+    }
4d7edd7
     if (read_count > max_count) {
4d7edd7
         read_count = max_count;
4d7edd7
-    } else if (read_count < 0) {
4d7edd7
-        /*
4d7edd7
-         * read beyond XATTR value
4d7edd7
-         */
4d7edd7
-        read_count = 0;
4d7edd7
     }
4d7edd7
     err = pdu_marshal(pdu, offset, "d", read_count);
4d7edd7
     if (err < 0) {
4d7edd7
@@ -1959,23 +1956,18 @@ static int v9fs_xattr_write(V9fsState *s, V9fsPDU *pdu, V9fsFidState *fidp,
4d7edd7
 {
4d7edd7
     int i, to_copy;
4d7edd7
     ssize_t err = 0;
4d7edd7
-    int write_count;
4d7edd7
-    int64_t xattr_len;
4d7edd7
+    uint64_t write_count;
4d7edd7
     size_t offset = 7;
4d7edd7
 
4d7edd7
 
4d7edd7
-    xattr_len = fidp->fs.xattr.len;
4d7edd7
-    write_count = xattr_len - off;
4d7edd7
-    if (write_count > count) {
4d7edd7
-        write_count = count;
4d7edd7
-    } else if (write_count < 0) {
4d7edd7
-        /*
4d7edd7
-         * write beyond XATTR value len specified in
4d7edd7
-         * xattrcreate
4d7edd7
-         */
4d7edd7
+    if (fidp->fs.xattr.len < off) {
4d7edd7
         err = -ENOSPC;
4d7edd7
         goto out;
4d7edd7
     }
4d7edd7
+    write_count = fidp->fs.xattr.len - off;
4d7edd7
+    if (write_count > count) {
4d7edd7
+        write_count = count;
4d7edd7
+    }
4d7edd7
     err = pdu_marshal(pdu, offset, "d", write_count);
4d7edd7
     if (err < 0) {
4d7edd7
         return err;