[PATCH v2 1/2] vhost: fix possible FDs leak

Xia, Chenbo chenbo.xia at intel.com
Tue Feb 7 06:38:45 CET 2023


> -----Original Message-----
> From: Maxime Coquelin <maxime.coquelin at redhat.com>
> Sent: Saturday, January 28, 2023 12:56 AM
> To: dev at dpdk.org; david.marchand at redhat.com; Xia, Chenbo
> <chenbo.xia at intel.com>
> Cc: Coquelin, Maxime <maxime.coquelin at redhat.com>; stable at dpdk.org
> Subject: [PATCH v2 1/2] vhost: fix possible FDs leak
>
> On failure, read_vhost_message() only closed the message
> FDs if the header size was unexpected, but there are other
> cases where it is required. For exemple in the case the

example

With this fixed:

Reviewed-by: Chenbo Xia <chenbo.xia at intel.com>

> payload size read from the header is greater than the
> expected maximum payload size.
>
> This patch fixes this by closing all messages FDs in all
> error cases.
>
> Fixes: bf472259dde6 ("vhost: fix possible denial of service by leaking
> FDs")
> Cc: stable at dpdk.org
>
> Signed-off-by: Maxime Coquelin <maxime.coquelin at redhat.com>
> ---
>  lib/vhost/vhost_user.c | 23 +++++++++++++++--------
>  1 file changed, 15 insertions(+), 8 deletions(-)
>
> diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
> index 9902ae9944..943058725e 100644
> --- a/lib/vhost/vhost_user.c
> +++ b/lib/vhost/vhost_user.c
> @@ -2817,29 +2817,36 @@ read_vhost_message(struct virtio_net *dev, int
> sockfd, struct  vhu_msg_context *
>
>       ret = read_fd_message(dev->ifname, sockfd, (char *)&ctx->msg,
> VHOST_USER_HDR_SIZE,
>               ctx->fds, VHOST_MEMORY_MAX_NREGIONS, &ctx->fd_num);
> -     if (ret <= 0) {
> -             return ret;
> -     } else if (ret != VHOST_USER_HDR_SIZE) {
> +     if (ret <= 0)
> +             goto out;
> +
> +     if (ret != VHOST_USER_HDR_SIZE) {
>               VHOST_LOG_CONFIG(dev->ifname, ERR, "Unexpected header size
> read\n");
> -             close_msg_fds(ctx);
> -             return -1;
> +             ret = -1;
> +             goto out;
>       }
>
>       if (ctx->msg.size) {
>               if (ctx->msg.size > sizeof(ctx->msg.payload)) {
>                       VHOST_LOG_CONFIG(dev->ifname, ERR, "invalid msg
> size: %d\n",
>                               ctx->msg.size);
> -                     return -1;
> +                     ret = -1;
> +                     goto out;
>               }
>               ret = read(sockfd, &ctx->msg.payload, ctx->msg.size);
>               if (ret <= 0)
> -                     return ret;
> +                     goto out;
>               if (ret != (int)ctx->msg.size) {
>                       VHOST_LOG_CONFIG(dev->ifname, ERR, "read control message
> failed\n");
> -                     return -1;
> +                     ret = -1;
> +                     goto out;
>               }
>       }
>
> +out:
> +     if (ret <= 0)
> +             close_msg_fds(ctx);
> +
>       return ret;
>  }
>
> --
> 2.39.1



More information about the stable mailing list