Blame SOURCES/kvm-vfio-Fix-overrun-after-readlink-fills-buffer-complet.patch

05bba0
From a254fe579062a9eaf97f2b81474c19b4b46ddc85 Mon Sep 17 00:00:00 2001
05bba0
From: Alex Williamson <alex.williamson@redhat.com>
05bba0
Date: Fri, 10 Apr 2015 16:33:56 +0200
05bba0
Subject: [PATCH 04/14] vfio: Fix overrun after readlink() fills buffer
05bba0
 completely
05bba0
05bba0
Message-id: <20150410163356.15324.47617.stgit@gimli.home>
05bba0
Patchwork-id: 64786
05bba0
O-Subject: [RHEL7.2 qemu-kvm PATCH 4/8] vfio: Fix overrun after readlink() fills buffer completely
05bba0
Bugzilla: 1210504
05bba0
RH-Acked-by: Thomas Huth <thuth@redhat.com>
05bba0
RH-Acked-by: Laszlo Ersek <lersek@redhat.com>
05bba0
RH-Acked-by: Bandan Das <bsd@redhat.com>
05bba0
05bba0
From: Markus Armbruster <armbru@redhat.com>
05bba0
05bba0
Upstream: 13665a2d2f675341e73618fcd7f9d36b6c68b509
05bba0
05bba0
readlink() returns the number of bytes written to the buffer, and it
05bba0
doesn't write a terminating null byte.  vfio_init() writes it itself.
05bba0
Overruns the buffer when readlink() filled it completely.
05bba0
05bba0
Fix by treating readlink() filling the buffer completely as error,
05bba0
like we do in pci-assign.c's assign_failed_examine().
05bba0
05bba0
Spotted by Coverity.
05bba0
05bba0
Signed-off-by: Markus Armbruster <armbru@redhat.com>
05bba0
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
05bba0
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
05bba0
---
05bba0
 hw/misc/vfio.c | 6 +++---
05bba0
 1 file changed, 3 insertions(+), 3 deletions(-)
05bba0
05bba0
diff --git a/hw/misc/vfio.c b/hw/misc/vfio.c
05bba0
index 57bc974..81e6594 100644
05bba0
--- a/hw/misc/vfio.c
05bba0
+++ b/hw/misc/vfio.c
05bba0
@@ -3767,10 +3767,10 @@ static int vfio_initfn(PCIDevice *pdev)
05bba0
 
05bba0
     strncat(path, "iommu_group", sizeof(path) - strlen(path) - 1);
05bba0
 
05bba0
-    len = readlink(path, iommu_group_path, PATH_MAX);
05bba0
-    if (len <= 0) {
05bba0
+    len = readlink(path, iommu_group_path, sizeof(path));
05bba0
+    if (len <= 0 || len >= sizeof(path)) {
05bba0
         error_report("vfio: error no iommu_group for device");
05bba0
-        return -errno;
05bba0
+        return len < 0 ? -errno : ENAMETOOLONG;
05bba0
     }
05bba0
 
05bba0
     iommu_group_path[len] = 0;
05bba0
-- 
05bba0
1.8.3.1
05bba0