mirror of
https://github.com/qemu/qemu.git
synced 2025-07-21 23:25:15 +00:00
linux-user/gen-vdso: Don't read off the end of buf[]
In gen-vdso we load in a file and assume it's a valid ELF file. In particular we assume it's big enough to be able to read the ELF information in e_ident in the ELF header. Add a check that the total file length is at least big enough for all the e_ident bytes, which is good enough for the code in gen-vdso.c. This will catch the most obvious possible bad input file (truncated) and allow us to run the sanity checks like "not actually an ELF file" without potentially crashing. The code in elf32_process() and elf64_process() still makes assumptions about the file being well-formed, but this is OK because we only run it on the vdso binaries that we create ourselves in the build process by running the compiler. Signed-off-by: Peter Maydell <peter.maydell@linaro.org> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Signed-off-by: Richard Henderson <richard.henderson@linaro.org> Message-ID: <20250710170707.1299926-3-peter.maydell@linaro.org>
This commit is contained in:

committed by
Richard Henderson

parent
ff3b0e8d32
commit
cb8607b89f
@ -124,6 +124,11 @@ int main(int argc, char **argv)
|
||||
goto perror_inf;
|
||||
}
|
||||
|
||||
if (total_len < EI_NIDENT) {
|
||||
fprintf(stderr, "%s: file too small (truncated?)\n", inf_name);
|
||||
return EXIT_FAILURE;
|
||||
}
|
||||
|
||||
buf = malloc(total_len);
|
||||
if (buf == NULL) {
|
||||
goto perror_inf;
|
||||
|
Reference in New Issue
Block a user