Am 14.04.2014 16:26, schrieb Peter Maydell:
> On 31 March 2014 08:08, Stefan Hajnoczi <stefa...@redhat.com> wrote:
>> Check incoming_posn to avoid out-of-bounds array accesses if the ivshmem
>> server on the host sends invalid values.
>>
>> Cc: Cam Macdonell <c...@cs.ualberta.ca>
>> Reported-by: Sebastian Krahmer <krah...@suse.de>
>> Signed-off-by: Stefan Hajnoczi <stefa...@redhat.com>
>> ---
>>  hw/misc/ivshmem.c | 9 +++++++++
>>  1 file changed, 9 insertions(+)
>>
>> diff --git a/hw/misc/ivshmem.c b/hw/misc/ivshmem.c
>> index 78363ce..25c22b7 100644
>> --- a/hw/misc/ivshmem.c
>> +++ b/hw/misc/ivshmem.c
>> @@ -383,6 +383,9 @@ static void close_guest_eventfds(IVShmemState *s, int 
>> posn)
>>      if (!ivshmem_has_feature(s, IVSHMEM_IOEVENTFD)) {
>>          return;
>>      }
>> +    if (posn < 0 || posn > s->nb_peers) {
>> +        return;
>> +    }
>>
>>      guest_curr_max = s->peers[posn].nb_eventfds;
> 
> Shouldn't the upper bound check be checking ">=", not ">" ?

Indeed, looks like it. We're allocating s->nb_peers * sizeof(Peer) in
increase_dynamic_storage() just below.

Regards,
Andreas

-- 
SUSE LINUX Products GmbH, Maxfeldstr. 5, 90409 Nürnberg, Germany
GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer; HRB 16746 AG Nürnberg

Reply via email to