From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <pve-devel-bounces@lists.proxmox.com> Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id EE5461FF173 for <inbox@lore.proxmox.com>; Mon, 10 Feb 2025 14:56:45 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id CB200E4DE; Mon, 10 Feb 2025 14:56:41 +0100 (CET) From: Fiona Ebner <f.ebner@proxmox.com> To: pve-devel@lists.proxmox.com Date: Mon, 10 Feb 2025 14:56:05 +0100 Message-Id: <20250210135605.53763-1-f.ebner@proxmox.com> X-Mailer: git-send-email 2.39.5 MIME-Version: 1.0 X-SPAM-LEVEL: Spam detection results: 0 AWL -0.046 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH guest-common] fix #6130: remote migration: untaint bandwidth limit from remote X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion <pve-devel.lists.proxmox.com> List-Unsubscribe: <https://lists.proxmox.com/cgi-bin/mailman/options/pve-devel>, <mailto:pve-devel-request@lists.proxmox.com?subject=unsubscribe> List-Archive: <http://lists.proxmox.com/pipermail/pve-devel/> List-Post: <mailto:pve-devel@lists.proxmox.com> List-Help: <mailto:pve-devel-request@lists.proxmox.com?subject=help> List-Subscribe: <https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel>, <mailto:pve-devel-request@lists.proxmox.com?subject=subscribe> Reply-To: Proxmox VE development discussion <pve-devel@lists.proxmox.com> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pve-devel-bounces@lists.proxmox.com Sender: "pve-devel" <pve-devel-bounces@lists.proxmox.com> Remote migration via API will be invoked under Perl's '-T' switch to detect tainted input used in commands. For remote migration, the bandwidth limit from the remote side would be such tainted input. This would lead to failure for offline disk migration when the target node's bandwidth limit is stricter when invoking the 'pvesm export' command: > command 'set -o pipefail && pvesm export rbd:vm-400-disk-0 \ > raw+size - -with-snapshots 0 | /usr/bin/cstream -t 307232768' \ > failed: Insecure dependency in exec while running with -T switch Untaint the value to fix the issue. Note that the schema for the bandwidth limits in datacenter.cfg and storage.cfg allows fractional values. Avoid re-using the same variable for both, the reply from the remote (which is a hash) and the actual remote bandwidth limit. This also makes it possible to use the "assign regex match or die" pattern while accessing the original value in the error message. Signed-off-by: Fiona Ebner <f.ebner@proxmox.com> --- src/PVE/AbstractMigrate.pm | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/src/PVE/AbstractMigrate.pm b/src/PVE/AbstractMigrate.pm index c337bcf..54f7956 100644 --- a/src/PVE/AbstractMigrate.pm +++ b/src/PVE/AbstractMigrate.pm @@ -350,9 +350,14 @@ sub get_bwlimit { storages => [$target], bwlimit => $self->{opts}->{bwlimit}, }; - my $remote_bwlimit = PVE::Tunnel::write_tunnel($self->{tunnel}, 10, 'bwlimit', $bwlimit_opts); - if ($remote_bwlimit && $remote_bwlimit->{bwlimit}) { - $remote_bwlimit = $remote_bwlimit->{bwlimit}; + + my $bwlimit_reply = PVE::Tunnel::write_tunnel( + $self->{tunnel}, 10, 'bwlimit', $bwlimit_opts); + + if ($bwlimit_reply && $bwlimit_reply->{bwlimit}) { + # untaint + my ($remote_bwlimit) = ($bwlimit_reply->{bwlimit} =~ m/^(\d+(.\d+)?)$/) + or die "invalid remote bandwidth limit: '$bwlimit_reply->{bwlimit}'\n"; $bwlimit = $remote_bwlimit if (!$bwlimit || $bwlimit > $remote_bwlimit); -- 2.39.5 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel