If the sum of iov element lengths overflows, the XENSTORE_PAYLOAD_MAX can
pass, after which we'll write 4G of data with a good-looking length field, and
the remainder of the payload will be interpreted as subsequent commands.
Check each iov element length for XENSTORE_PAYLOAD_MAX before accmulating it.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jason Andryuk <jason.andryuk@amd.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
master commit:
42db2deb5e7617f0459b68cd73ab503938356186
master date: 2024-07-23 15:11:27 +0100
struct xsd_sockmsg msg;
void *ret = NULL;
int saved_errno;
- unsigned int i;
+ unsigned int i, msg_len;
struct sigaction ignorepipe, oldact;
msg.tx_id = t;
msg.req_id = 0;
msg.type = type;
- msg.len = 0;
- for (i = 0; i < num_vecs; i++)
- msg.len += iovec[i].iov_len;
- if (msg.len > XENSTORE_PAYLOAD_MAX) {
- errno = E2BIG;
- return 0;
+ /* Calculate the payload length by summing iovec elements */
+ for (i = 0, msg_len = 0; i < num_vecs; i++) {
+ if ((iovec[i].iov_len > XENSTORE_PAYLOAD_MAX) ||
+ ((msg_len += iovec[i].iov_len) > XENSTORE_PAYLOAD_MAX)) {
+ errno = E2BIG;
+ return NULL;
+ }
}
+ msg.len = msg_len;
+
ignorepipe.sa_handler = SIG_IGN;
sigemptyset(&ignorepipe.sa_mask);
ignorepipe.sa_flags = 0;