mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-01-22 04:25:18 +00:00
Prohibit unbounded arrays in XDR protocols
The use of <> is a security issue for RPC parameters, since a malicious client can set a huge array length causing arbitrary memory allocation in the daemon. It is also a robustness issue for RPC return values, because if the stream is corrupted, it can cause the client to also allocate arbitrary memory. Use a syntax-check rule to prohibit any use of <> Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
This commit is contained in:
parent
47fb5672f2
commit
a4d1cfdc59
6
cfg.mk
6
cfg.mk
@ -836,6 +836,12 @@ sc_prohibit_config_h_in_headers:
|
|||||||
halt='headers should not include <config.h>' \
|
halt='headers should not include <config.h>' \
|
||||||
$(_sc_search_regexp)
|
$(_sc_search_regexp)
|
||||||
|
|
||||||
|
sc_prohibit_unbounded_arrays_in_rpc:
|
||||||
|
@prohibit='<>' \
|
||||||
|
in_vc_files='\.x$$' \
|
||||||
|
halt='Arrays in XDR must have a upper limit set for <NNN>' \
|
||||||
|
$(_sc_search_regexp)
|
||||||
|
|
||||||
|
|
||||||
# We don't use this feature of maint.mk.
|
# We don't use this feature of maint.mk.
|
||||||
prev_version_file = /dev/null
|
prev_version_file = /dev/null
|
||||||
|
Loading…
x
Reference in New Issue
Block a user