Blame SOURCES/0010-Avoids-unchecked-file-transfer-IDs-allocation-and-us.patch

93d60d
From 956608c1344f185e39294004b64906a7e1b5c14c Mon Sep 17 00:00:00 2001
93d60d
From: Frediano Ziglio <freddy77@gmail.com>
93d60d
Date: Sat, 19 Sep 2020 15:13:42 +0100
93d60d
Subject: [PATCH vd_agent_linux 10/17] Avoids unchecked file transfer IDs
93d60d
 allocation and usage
93d60d
93d60d
Avoid agents allocating file transfers.
93d60d
The "active_xfers" entries are now inserted when client start sending
93d60d
files.
93d60d
Also different agents cannot mess with other agent transfers as a
93d60d
transfer is bound to a single agent.
93d60d
93d60d
This issue was reported by SUSE security team.
93d60d
93d60d
Signed-off-by: Frediano Ziglio <fziglio@redhat.com>
93d60d
Acked-by: Uri Lublin <uril@redhat.com>
93d60d
---
93d60d
 src/vdagentd/vdagentd.c | 28 ++++++++++++++++++++++------
93d60d
 1 file changed, 22 insertions(+), 6 deletions(-)
93d60d
93d60d
diff --git a/src/vdagentd/vdagentd.c b/src/vdagentd/vdagentd.c
93d60d
index eddfcf6..8961a99 100644
93d60d
--- a/src/vdagentd/vdagentd.c
93d60d
+++ b/src/vdagentd/vdagentd.c
93d60d
@@ -381,9 +381,11 @@ static void do_client_file_xfer(VirtioPort *vport,
93d60d
                s->id, VD_AGENT_FILE_XFER_STATUS_SESSION_LOCKED, NULL, 0);
93d60d
             return;
93d60d
         }
93d60d
-        udscs_write(active_session_conn, VDAGENTD_FILE_XFER_START, 0, 0,
93d60d
-                    data, message_header->size);
93d60d
-        return;
93d60d
+        msg_type = VDAGENTD_FILE_XFER_START;
93d60d
+        id = s->id;
93d60d
+        // associate the id with the active connection
93d60d
+        g_hash_table_insert(active_xfers, GUINT_TO_POINTER(id), active_session_conn);
93d60d
+        break;
93d60d
     }
93d60d
     case VD_AGENT_FILE_XFER_STATUS: {
93d60d
         VDAgentFileXferStatusMessage *s = (VDAgentFileXferStatusMessage *)data;
93d60d
@@ -408,6 +410,12 @@ static void do_client_file_xfer(VirtioPort *vport,
93d60d
         return;
93d60d
     }
93d60d
     udscs_write(conn, msg_type, 0, 0, data, message_header->size);
93d60d
+
93d60d
+    // client told that transfer is ended, agents too stop the transfer
93d60d
+    // and release resources
93d60d
+    if (message_header->type == VD_AGENT_FILE_XFER_STATUS) {
93d60d
+        g_hash_table_remove(active_xfers, GUINT_TO_POINTER(id));
93d60d
+    }
93d60d
 }
93d60d
 
93d60d
 static void forward_data_to_session_agent(uint32_t type, uint8_t *data, size_t size)
93d60d
@@ -1015,6 +1023,15 @@ static void do_agent_file_xfer_status(UdscsConnection             *conn,
93d60d
     const gchar *log_msg = NULL;
93d60d
     guint data_size = 0;
93d60d
 
93d60d
+    UdscsConnection *task_conn = g_hash_table_lookup(active_xfers, task_id);
93d60d
+    if (task_conn == NULL || task_conn != conn) {
93d60d
+        // Protect against misbehaving agent.
93d60d
+        // Ignore the message, but do not disconnect the agent, to protect against
93d60d
+        // a misbehaving client that tries to disconnect a good agent
93d60d
+        // e.g. by sending a new task and immediately cancelling it.
93d60d
+        return;
93d60d
+    }
93d60d
+
93d60d
     /* header->arg1 = file xfer task id, header->arg2 = file xfer status */
93d60d
     switch (header->arg2) {
93d60d
         case VD_AGENT_FILE_XFER_STATUS_NOT_ENOUGH_SPACE:
93d60d
@@ -1029,10 +1046,9 @@ static void do_agent_file_xfer_status(UdscsConnection             *conn,
93d60d
     send_file_xfer_status(virtio_port, log_msg, header->arg1, header->arg2,
93d60d
                           data, data_size);
93d60d
 
93d60d
-    if (header->arg2 == VD_AGENT_FILE_XFER_STATUS_CAN_SEND_DATA)
93d60d
-        g_hash_table_insert(active_xfers, task_id, conn);
93d60d
-    else
93d60d
+    if (header->arg2 != VD_AGENT_FILE_XFER_STATUS_CAN_SEND_DATA) {
93d60d
         g_hash_table_remove(active_xfers, task_id);
93d60d
+    }
93d60d
 }
93d60d
 
93d60d
 static void agent_read_complete(UdscsConnection *conn,
93d60d
-- 
93d60d
2.26.2
93d60d