Fix possible integer overflow in guest memory bounds checking, which could
lead to access from the virtual machine to the heap of the bhyve(8) process. Submitted by: Felix Wilhelm <fwilhelm ernw.de> Patch by: grehan Security: FreeBSD-SA-16:38.bhyve
This commit is contained in:
parent
e7aed7dacb
commit
224897e572
@ -426,13 +426,18 @@ vm_map_gpa(struct vmctx *ctx, vm_paddr_t gaddr, size_t len)
|
||||
{
|
||||
|
||||
if (ctx->lowmem > 0) {
|
||||
if (gaddr < ctx->lowmem && gaddr + len <= ctx->lowmem)
|
||||
if (gaddr < ctx->lowmem && len <= ctx->lowmem &&
|
||||
gaddr + len <= ctx->lowmem)
|
||||
return (ctx->baseaddr + gaddr);
|
||||
}
|
||||
|
||||
if (ctx->highmem > 0) {
|
||||
if (gaddr >= 4*GB && gaddr + len <= 4*GB + ctx->highmem)
|
||||
return (ctx->baseaddr + gaddr);
|
||||
if (gaddr >= 4*GB) {
|
||||
if (gaddr < 4*GB + ctx->highmem &&
|
||||
len <= ctx->highmem &&
|
||||
gaddr + len <= 4*GB + ctx->highmem)
|
||||
return (ctx->baseaddr + gaddr);
|
||||
}
|
||||
}
|
||||
|
||||
return (NULL);
|
||||
|
Loading…
x
Reference in New Issue
Block a user