Page MenuHomeFreeBSD

bhyve: buffer overflow in pci_vtcon_control_send
ClosedPublic

Authored by khorben_defora.org on Oct 2 2024, 9:51 PM.
Tags
None
Referenced Files
Unknown Object (File)
Fri, Jan 24, 12:02 PM
Unknown Object (File)
Dec 23 2024, 7:06 AM
Unknown Object (File)
Dec 14 2024, 9:55 PM
Unknown Object (File)
Dec 4 2024, 6:45 PM
Unknown Object (File)
Nov 25 2024, 4:07 PM
Unknown Object (File)
Nov 22 2024, 11:57 AM
Unknown Object (File)
Nov 6 2024, 11:40 PM
Unknown Object (File)
Nov 6 2024, 11:31 PM

Details

Summary

This is a follow-up to the fix for HYP-19, addressing another condition where an overflow might still occur. (Spotted by jhb@, thanks!)

Reported by: Synacktiv
Security: HYP-19
Sponsored by: Alpha-Omega Project
Sponsored by: The FreeBSD Foundation

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

khorben_defora.org created this object with edit policy "Custom Policy".
khorben_defora.org added a parent revision: Restricted Differential Revision.
markj added inline comments.
usr.sbin/bhyve/pci_virtio_console.c
587

This check should come before the vq_getchain() call. The vq_relchain() call at the out label contains an instance of the overflowing expression.

Moved the sanity check for len to the beginning of pci_vtcon_control_send().

This revision is now accepted and ready to land.Oct 15 2024, 8:41 PM