Add NULL check in ns_lookup_list_search for DNS resolution#4844
Closed
sumleo wants to merge 1 commit intobytecodealliance:mainfrom
Closed
Add NULL check in ns_lookup_list_search for DNS resolution#4844sumleo wants to merge 1 commit intobytecodealliance:mainfrom
sumleo wants to merge 1 commit intobytecodealliance:mainfrom
Conversation
When no DNS allowlist is configured via --allow-resolve, wasi_ctx->ns_lookup_list is NULL. This NULL pointer gets passed to ns_lookup_list_search which dereferences it unconditionally at the while (*list) loop, causing a crash. A guest WASM module can trigger this by calling sock_addr_resolve.
lum1n0us
reviewed
Mar 3, 2026
| { | ||
| size_t host_len = strlen(host), suffix_len; | ||
|
|
||
| if (!list) |
Contributor
There was a problem hiding this comment.
This is a good practice on defensive programing skills.
But WAMR tends to use a caller-guarantee policy. Caller should make sure their inputs are correct. In this case, wash-app should check inputs before uses Wasm/WASI APIs.
Therefore, I tend to reject this PR.
Contributor
Author
|
Closing this PR. After considering the feedback, I agree with the caller-guarantee policy — WAMR expects callers to ensure correct inputs before using WASI APIs, so adding defensive null-checks in the sandboxed system primitives layer is not aligned with the project design philosophy. Thanks for the review. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Fix a NULL pointer dereference in
ns_lookup_list_search()that causes a crash when no DNS allowlist is configured.Problem
When the WASI runtime is started without
--allow-resolve,wasi_ctx->ns_lookup_listis NULL. When a guest WASM module callssock_addr_resolve, the call chain eventually reachesns_lookup_list_search()inposix.c, which dereferences thelistparameter unconditionally atwhile (*list)(line 77). This causes a segmentation fault.Fix
Add a NULL check for the
listparameter before thewhile (*list)loop. Iflistis NULL (no DNS allowlist configured), the function returnsfalse, correctly denying the DNS lookup without crashing.Test
Verified that without
--allow-resolve, callingsock_addr_resolvefrom a WASM module no longer crashes the runtime and instead returns an appropriate error.