|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 1/2] xenstore: sanity check incoming message body lengths
Matthew Daley writes ("[PATCH 1/2] xenstore: sanity check incoming message body
lengths"):
> This is for the client-side receiving messages from xenstored, so there
> is no security impact, unlike XSA-72.
...
> + /* Sanity check message body length. */
> + if (msg->hdr.len > XENSTORE_PAYLOAD_MAX) {
> + saved_errno = E2BIG;
> + goto error_freemsg;
> + }
If this situation should arise, your proposal would discard the
headers of the bogus message and read the start of what would be the
over-long payload as the next header.
Unfortunately, it looks like the existing code already does exactly
this if it experiences a malloc failure !
It would be best to either kill the connection dead, or perhaps to
skip the overlong data.
Ian.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |