hw/pvrdma: Protect against buggy or malicious guest driver
authorYuval Shaia <yuval.shaia.ml@gmail.com>
Sun, 3 Apr 2022 09:52:34 +0000 (12:52 +0300)
committerLaurent Vivier <laurent@vivier.eu>
Mon, 16 Jan 2023 17:49:38 +0000 (18:49 +0100)
Guest driver might execute HW commands when shared buffers are not yet
allocated.
This could happen on purpose (malicious guest) or because of some other
guest/host address mapping error.
We need to protect againts such case.

Fixes: CVE-2022-1050
Reported-by: Raven <wxhusst@gmail.com>
Signed-off-by: Yuval Shaia <yuval.shaia.ml@gmail.com>
Message-Id: <20220403095234.2210-1-yuval.shaia.ml@gmail.com>
Signed-off-by: Laurent Vivier <laurent@vivier.eu>
hw/rdma/vmw/pvrdma_cmd.c

index 1eca6328c9247c4c24d2c168075f329ffff469db..c6ed02598211c8edc26258322fd29060f5d3a414 100644 (file)
@@ -776,6 +776,12 @@ int pvrdma_exec_cmd(PVRDMADev *dev)
 
     dsr_info = &dev->dsr_info;
 
+    if (!dsr_info->dsr) {
+            /* Buggy or malicious guest driver */
+            rdma_error_report("Exec command without dsr, req or rsp buffers");
+            goto out;
+    }
+
     if (dsr_info->req->hdr.cmd >= sizeof(cmd_handlers) /
                       sizeof(struct cmd_handler)) {
         rdma_error_report("Unsupported command");