|
|
05bba0 |
From a254fe579062a9eaf97f2b81474c19b4b46ddc85 Mon Sep 17 00:00:00 2001
|
|
|
05bba0 |
From: Alex Williamson <alex.williamson@redhat.com>
|
|
|
05bba0 |
Date: Fri, 10 Apr 2015 16:33:56 +0200
|
|
|
05bba0 |
Subject: [PATCH 04/14] vfio: Fix overrun after readlink() fills buffer
|
|
|
05bba0 |
completely
|
|
|
05bba0 |
|
|
|
05bba0 |
Message-id: <20150410163356.15324.47617.stgit@gimli.home>
|
|
|
05bba0 |
Patchwork-id: 64786
|
|
|
05bba0 |
O-Subject: [RHEL7.2 qemu-kvm PATCH 4/8] vfio: Fix overrun after readlink() fills buffer completely
|
|
|
05bba0 |
Bugzilla: 1210504
|
|
|
05bba0 |
RH-Acked-by: Thomas Huth <thuth@redhat.com>
|
|
|
05bba0 |
RH-Acked-by: Laszlo Ersek <lersek@redhat.com>
|
|
|
05bba0 |
RH-Acked-by: Bandan Das <bsd@redhat.com>
|
|
|
05bba0 |
|
|
|
05bba0 |
From: Markus Armbruster <armbru@redhat.com>
|
|
|
05bba0 |
|
|
|
05bba0 |
Upstream: 13665a2d2f675341e73618fcd7f9d36b6c68b509
|
|
|
05bba0 |
|
|
|
05bba0 |
readlink() returns the number of bytes written to the buffer, and it
|
|
|
05bba0 |
doesn't write a terminating null byte. vfio_init() writes it itself.
|
|
|
05bba0 |
Overruns the buffer when readlink() filled it completely.
|
|
|
05bba0 |
|
|
|
05bba0 |
Fix by treating readlink() filling the buffer completely as error,
|
|
|
05bba0 |
like we do in pci-assign.c's assign_failed_examine().
|
|
|
05bba0 |
|
|
|
05bba0 |
Spotted by Coverity.
|
|
|
05bba0 |
|
|
|
05bba0 |
Signed-off-by: Markus Armbruster <armbru@redhat.com>
|
|
|
05bba0 |
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
|
|
|
05bba0 |
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
|
05bba0 |
---
|
|
|
05bba0 |
hw/misc/vfio.c | 6 +++---
|
|
|
05bba0 |
1 file changed, 3 insertions(+), 3 deletions(-)
|
|
|
05bba0 |
|
|
|
05bba0 |
diff --git a/hw/misc/vfio.c b/hw/misc/vfio.c
|
|
|
05bba0 |
index 57bc974..81e6594 100644
|
|
|
05bba0 |
--- a/hw/misc/vfio.c
|
|
|
05bba0 |
+++ b/hw/misc/vfio.c
|
|
|
05bba0 |
@@ -3767,10 +3767,10 @@ static int vfio_initfn(PCIDevice *pdev)
|
|
|
05bba0 |
|
|
|
05bba0 |
strncat(path, "iommu_group", sizeof(path) - strlen(path) - 1);
|
|
|
05bba0 |
|
|
|
05bba0 |
- len = readlink(path, iommu_group_path, PATH_MAX);
|
|
|
05bba0 |
- if (len <= 0) {
|
|
|
05bba0 |
+ len = readlink(path, iommu_group_path, sizeof(path));
|
|
|
05bba0 |
+ if (len <= 0 || len >= sizeof(path)) {
|
|
|
05bba0 |
error_report("vfio: error no iommu_group for device");
|
|
|
05bba0 |
- return -errno;
|
|
|
05bba0 |
+ return len < 0 ? -errno : ENAMETOOLONG;
|
|
|
05bba0 |
}
|
|
|
05bba0 |
|
|
|
05bba0 |
iommu_group_path[len] = 0;
|
|
|
05bba0 |
--
|
|
|
05bba0 |
1.8.3.1
|
|
|
05bba0 |
|