Page MenuHomeFreeBSD

bhyve: buffer overflow in pci_vtcon_control_send
ClosedPublic

Authored by khorben on Oct 2 2024, 9:51 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sat, Oct 18, 4:41 AM
Unknown Object (File)
Mon, Oct 13, 6:59 AM
Unknown Object (File)
Wed, Oct 8, 6:01 PM
Unknown Object (File)
Sun, Oct 5, 9:42 AM
Unknown Object (File)
Fri, Oct 3, 5:21 PM
Unknown Object (File)
Fri, Oct 3, 3:15 PM
Unknown Object (File)
Thu, Oct 2, 7:27 AM
Unknown Object (File)
Fri, Sep 26, 11:43 PM

Details

Summary

This is a follow-up to the fix for HYP-19, addressing another condition where an overflow might still occur. (Spotted by jhb@, thanks!)

Reported by: Synacktiv
Security: HYP-19
Sponsored by: Alpha-Omega Project
Sponsored by: The FreeBSD Foundation

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

khorben created this object with edit policy "Custom Policy".
khorben added a parent revision: Restricted Differential Revision.
markj added inline comments.
usr.sbin/bhyve/pci_virtio_console.c
587

This check should come before the vq_getchain() call. The vq_relchain() call at the out label contains an instance of the overflowing expression.

Moved the sanity check for len to the beginning of pci_vtcon_control_send().

This revision is now accepted and ready to land.Oct 15 2024, 8:41 PM