]> xenbits.xensource.com Git - qemu-xen.git/commitdiff
vnc: avoid underflow when accessing user-provided address
authorPaolo Bonzini <pbonzini@redhat.com>
Thu, 30 Mar 2023 12:23:40 +0000 (14:23 +0200)
committerMichael Tokarev <mjt@tls.msk.ru>
Thu, 27 Apr 2023 05:52:57 +0000 (08:52 +0300)
If hostlen is zero, there is a possibility that addrstr[hostlen - 1]
underflows and, if a closing bracked is there, hostlen - 2 is passed
to g_strndup() on the next line.  If websocket==false then
addrstr[0] would be a colon, but if websocket==true this could in
principle happen.

Fix it by checking hostlen.

Reported by Coverity.

Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
(cherry picked from commit 3f9c41c5df9617510d8533cf6588172efb3df34b)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
ui/vnc.c

index 88f55cbf3c8b26d9b2cee97dd20bec9abbd0cc56..1856d573800e7cdf650b443dbe10bb17c5db2f9b 100644 (file)
--- a/ui/vnc.c
+++ b/ui/vnc.c
@@ -3765,7 +3765,7 @@ static int vnc_display_get_address(const char *addrstr,
 
         addr->type = SOCKET_ADDRESS_TYPE_INET;
         inet = &addr->u.inet;
-        if (addrstr[0] == '[' && addrstr[hostlen - 1] == ']') {
+        if (hostlen && addrstr[0] == '[' && addrstr[hostlen - 1] == ']') {
             inet->host = g_strndup(addrstr + 1, hostlen - 2);
         } else {
             inet->host = g_strndup(addrstr, hostlen);