qemu-stable
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] pci: fix overflow in snprintf string formatting


From: Ani Sinha
Subject: Re: [PATCH] pci: fix overflow in snprintf string formatting
Date: Tue, 31 May 2022 18:39:07 +0530

On Tue, May 31, 2022 at 6:15 PM Claudio Fontana <cfontana@suse.de> wrote:
>
> On 5/31/22 14:26, Ani Sinha wrote:
> > On Tue, May 31, 2022 at 5:20 PM Claudio Fontana <cfontana@suse.de> wrote:
> >>
> >> the code in pcibus_get_fw_dev_path contained the potential for a
> >> stack buffer overflow of 1 byte, potentially writing to the stack an
> >> extra NUL byte.
> >>
> >> This overflow could happen if the PCI slot is >= 0x10000000,
> >> and the PCI function is >= 0x10000000, due to the size parameter
> >> of snprintf being incorrectly calculated in the call:
> >>
> >>     if (PCI_FUNC(d->devfn))
> >>         snprintf(path + off, sizeof(path) + off, ",%x", 
> >> PCI_FUNC(d->devfn));
> >>
> >> since the off obtained from a previous call to snprintf is added
> >> instead of subtracted from the total available size of the buffer.
> >>
> >> Without the accurate size guard from snprintf, we end up writing in the
> >> worst case:
> >>
> >> name (32) + "@" (1) + SLOT (8) + "," (1) + FUNC (8) + term NUL (1) = 51 
> >> bytes
> >>
> >> In order to provide something more robust, replace all of the code in
> >> pcibus_get_fw_dev_path with a single call to g_strdup_printf,
> >> so there is no need to rely on manual calculations.
> >>
> >> Found by compiling QEMU with FORTIFY_SOURCE=3 as the error:
> >>
> >> *** buffer overflow detected ***: terminated
> >>
> >> Thread 1 "qemu-system-x86" received signal SIGABRT, Aborted.
> >> [Switching to Thread 0x7ffff642c380 (LWP 121307)]
> >> 0x00007ffff71ff55c in __pthread_kill_implementation () from 
> >> /lib64/libc.so.6
> >> (gdb) bt
> >>  #0  0x00007ffff71ff55c in __pthread_kill_implementation () at 
> >> /lib64/libc.so.6
> >>  #1  0x00007ffff71ac6f6 in raise () at /lib64/libc.so.6
> >>  #2  0x00007ffff7195814 in abort () at /lib64/libc.so.6
> >>  #3  0x00007ffff71f279e in __libc_message () at /lib64/libc.so.6
> >>  #4  0x00007ffff729767a in __fortify_fail () at /lib64/libc.so.6
> >>  #5  0x00007ffff7295c36 in  () at /lib64/libc.so.6
> >>  #6  0x00007ffff72957f5 in __snprintf_chk () at /lib64/libc.so.6
> >>  #7  0x0000555555b1c1fd in pcibus_get_fw_dev_path ()
> >>  #8  0x0000555555f2bde4 in qdev_get_fw_dev_path_helper.constprop ()
> >>  #9  0x0000555555f2bd86 in qdev_get_fw_dev_path_helper.constprop ()
> >>  #10 0x00005555559a6e5d in get_boot_device_path ()
> >>  #11 0x00005555559a712c in get_boot_devices_list ()
> >>  #12 0x0000555555b1a3d0 in fw_cfg_machine_reset ()
> >>  #13 0x0000555555bf4c2d in pc_machine_reset ()
> >>  #14 0x0000555555c66988 in qemu_system_reset ()
> >>  #15 0x0000555555a6dff6 in qdev_machine_creation_done ()
> >>  #16 0x0000555555c79186 in qmp_x_exit_preconfig.part ()
> >>  #17 0x0000555555c7b459 in qemu_init ()
> >>  #18 0x0000555555960a29 in main ()
> >>
> >> Found-by: Dario Faggioli <Dario Faggioli <dfaggioli@suse.com>
> >> Found-by: Martin Liška <martin.liska@suse.com>
> >
> > I think Reported-by: is preferred.
> >
> >> Cc: qemu-stable@nongnu.org
> >> Signed-off-by: Claudio Fontana <cfontana@suse.de>

Reviewed-by: Ani Sinha <ani@anisinha.ca>

> >> ---
> >>  hw/pci/pci.c | 18 +++++++++---------
> >>  1 file changed, 9 insertions(+), 9 deletions(-)
> >>
> >> diff --git a/hw/pci/pci.c b/hw/pci/pci.c
> >> index a9b37f8000..6e7015329c 100644
> >> --- a/hw/pci/pci.c
> >> +++ b/hw/pci/pci.c
> >> @@ -2640,15 +2640,15 @@ static char *pci_dev_fw_name(DeviceState *dev, 
> >> char *buf, int len)
> >>  static char *pcibus_get_fw_dev_path(DeviceState *dev)
> >>  {
> >>      PCIDevice *d = (PCIDevice *)dev;
> >> -    char path[50], name[33];
> >> -    int off;
> >> -
> >> -    off = snprintf(path, sizeof(path), "%s@%x",
> >> -                   pci_dev_fw_name(dev, name, sizeof name),
> >> -                   PCI_SLOT(d->devfn));
> >> -    if (PCI_FUNC(d->devfn))
> >> -        snprintf(path + off, sizeof(path) + off, ",%x", 
> >> PCI_FUNC(d->devfn));
> >> -    return g_strdup(path);
> >> +    char name[33];
> >> +    int has_func = !!PCI_FUNC(d->devfn);
> >> +
> >> +    return g_strdup_printf("%s@%x%s%.*x",
> >
> > I was experimenting with printf dynamic precision field with hex and
> > it was not quite working as expected. In particular, with precision 0,
> > I was still able to print a single hex digit. That is the following
> > still outputs 5 in stderr :
> >
> >> fprintf(stderr, "%.*x\n", 0, 5);
>
> Hi Ani, both the precision and the value need to be zero to omit the value,
> and this is what the patch relies on.

Ah ok. s/5/0 in the above fprintf does not indeed print anything.

>
> Ciao,
>
> Claudio
>
> >
> >
> >> +                           pci_dev_fw_name(dev, name, sizeof(name)),
> >> +                           PCI_SLOT(d->devfn),
> >> +                           has_func ? "," : "",
> >> +                           has_func,
> >> +                           PCI_FUNC(d->devfn));
> >>  }
> >>
> >>  static char *pcibus_get_dev_path(DeviceState *dev)
> >> --
> >> 2.26.2
> >>
> >>
>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]