summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2017-08-29 10:29:27 +0200
committerAdrian Dudau <adrian.dudau@enea.com>2017-08-29 13:30:51 +0200
commita7eb7fc1cd1d8598d44b4b80ccf39855c9b58841 (patch)
tree989712d0e548ab581351231f87b9f0ff3f80da63
parenta60bc47b963ee456ce140cabb1e15a1275a2f67d (diff)
downloadmeta-el-common-a7eb7fc1cd1d8598d44b4b80ccf39855c9b58841.tar.gz
qemu: CVE-2017-2620
QEMU built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. References: ========== https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2620 Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
-rw-r--r--recipes-devtools/qemu/qemu/0001-CVE-2017-2620.patch77
-rw-r--r--recipes-devtools/qemu/qemu/0002-CVE-2017-2620.patch55
-rw-r--r--recipes-devtools/qemu/qemu_%.bbappend6
3 files changed, 138 insertions, 0 deletions
diff --git a/recipes-devtools/qemu/qemu/0001-CVE-2017-2620.patch b/recipes-devtools/qemu/qemu/0001-CVE-2017-2620.patch
new file mode 100644
index 0000000..5684062
--- /dev/null
+++ b/recipes-devtools/qemu/qemu/0001-CVE-2017-2620.patch
@@ -0,0 +1,77 @@
1From 2ab8276a1cb2bcd0d14d4e05c193252f370b8251 Mon Sep 17 00:00:00 2001
2From: Bruce Rogers <brogers@suse.com>
3Date: Mon, 9 Jan 2017 13:35:20 -0700
4Subject: [PATCH] display: cirrus: ignore source pitch value as needed in
5 blit_is_unsafe
6
7Commit 4299b90 added a check which is too broad, given that the source
8pitch value is not required to be initialized for solid fill operations.
9This patch refines the blit_is_unsafe() check to ignore source pitch in
10that case. After applying the above commit as a security patch, we
11noticed the SLES 11 SP4 guest gui failed to initialize properly.
12
13Upstream-Status: Backport [this patch is needed for CVE-2017-2620]
14
15Signed-off-by: Bruce Rogers <brogers@suse.com>
16Message-id: 20170109203520.5619-1-brogers@suse.com
17Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
18(cherry picked from commit 913a87885f589d263e682c2eb6637c6e14538061)
19Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
20Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
21---
22 hw/display/cirrus_vga.c | 11 +++++++----
23 1 file changed, 7 insertions(+), 4 deletions(-)
24
25diff --git a/hw/display/cirrus_vga.c b/hw/display/cirrus_vga.c
26index bdb092e..379910d 100644
27--- a/hw/display/cirrus_vga.c
28+++ b/hw/display/cirrus_vga.c
29@@ -294,7 +294,7 @@ static bool blit_region_is_unsafe(struct CirrusVGAState *s,
30 return false;
31 }
32
33-static bool blit_is_unsafe(struct CirrusVGAState *s)
34+static bool blit_is_unsafe(struct CirrusVGAState *s, bool dst_only)
35 {
36 /* should be the case, see cirrus_bitblt_start */
37 assert(s->cirrus_blt_width > 0);
38@@ -308,6 +308,9 @@ static bool blit_is_unsafe(struct CirrusVGAState *s)
39 s->cirrus_blt_dstaddr & s->cirrus_addr_mask)) {
40 return true;
41 }
42+ if (dst_only) {
43+ return false;
44+ }
45 if (blit_region_is_unsafe(s, s->cirrus_blt_srcpitch,
46 s->cirrus_blt_srcaddr & s->cirrus_addr_mask)) {
47 return true;
48@@ -673,7 +676,7 @@ static int cirrus_bitblt_common_patterncopy(CirrusVGAState * s,
49
50 dst = s->vga.vram_ptr + (s->cirrus_blt_dstaddr & s->cirrus_addr_mask);
51
52- if (blit_is_unsafe(s))
53+ if (blit_is_unsafe(s, false))
54 return 0;
55
56 (*s->cirrus_rop) (s, dst, src,
57@@ -691,7 +694,7 @@ static int cirrus_bitblt_solidfill(CirrusVGAState *s, int blt_rop)
58 {
59 cirrus_fill_t rop_func;
60
61- if (blit_is_unsafe(s)) {
62+ if (blit_is_unsafe(s, true)) {
63 return 0;
64 }
65 rop_func = cirrus_fill[rop_to_index[blt_rop]][s->cirrus_blt_pixelwidth - 1];
66@@ -795,7 +798,7 @@ static int cirrus_do_copy(CirrusVGAState *s, int dst, int src, int w, int h)
67
68 static int cirrus_bitblt_videotovideo_copy(CirrusVGAState * s)
69 {
70- if (blit_is_unsafe(s))
71+ if (blit_is_unsafe(s, false))
72 return 0;
73
74 return cirrus_do_copy(s, s->cirrus_blt_dstaddr - s->vga.start_addr,
75--
761.9.1
77
diff --git a/recipes-devtools/qemu/qemu/0002-CVE-2017-2620.patch b/recipes-devtools/qemu/qemu/0002-CVE-2017-2620.patch
new file mode 100644
index 0000000..3910fb9
--- /dev/null
+++ b/recipes-devtools/qemu/qemu/0002-CVE-2017-2620.patch
@@ -0,0 +1,55 @@
1From fc8e94c3e5e74437c4e73a5582f17cfd4cae5ccf Mon Sep 17 00:00:00 2001
2From: Gerd Hoffmann <kraxel@redhat.com>
3Date: Wed, 8 Feb 2017 11:18:36 +0100
4Subject: [PATCH] cirrus: add blit_is_unsafe call to cirrus_bitblt_cputovideo
5 (CVE-2017-2620)
6
7CIRRUS_BLTMODE_MEMSYSSRC blits do NOT check blit destination
8and blit width, at all. Oops. Fix it.
9
10Security impact: high.
11
12The missing blit destination check allows to write to host memory.
13Basically same as CVE-2014-8106 for the other blit variants.
14
15CVE: CVE-2017-2620
16Upstream-Status: Backport
17
18Cc: qemu-stable@nongnu.org
19Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
20(cherry picked from commit 92f2b88cea48c6aeba8de568a45f2ed958f3c298)
21Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
22Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
23---
24 hw/display/cirrus_vga.c | 8 ++++++++
25 1 file changed, 8 insertions(+)
26
27diff --git a/hw/display/cirrus_vga.c b/hw/display/cirrus_vga.c
28index 629a5c8..6766349 100644
29--- a/hw/display/cirrus_vga.c
30+++ b/hw/display/cirrus_vga.c
31@@ -873,6 +873,10 @@ static int cirrus_bitblt_cputovideo(CirrusVGAState * s)
32 {
33 int w;
34
35+ if (blit_is_unsafe(s, true)) {
36+ return 0;
37+ }
38+
39 s->cirrus_blt_mode &= ~CIRRUS_BLTMODE_MEMSYSSRC;
40 s->cirrus_srcptr = &s->cirrus_bltbuf[0];
41 s->cirrus_srcptr_end = &s->cirrus_bltbuf[0];
42@@ -898,6 +902,10 @@ static int cirrus_bitblt_cputovideo(CirrusVGAState * s)
43 }
44 s->cirrus_srccounter = s->cirrus_blt_srcpitch * s->cirrus_blt_height;
45 }
46+
47+ /* the blit_is_unsafe call above should catch this */
48+ assert(s->cirrus_blt_srcpitch <= CIRRUS_BLTBUFSIZE);
49+
50 s->cirrus_srcptr = s->cirrus_bltbuf;
51 s->cirrus_srcptr_end = s->cirrus_bltbuf + s->cirrus_blt_srcpitch;
52 cirrus_update_memory_access(s);
53--
541.9.1
55
diff --git a/recipes-devtools/qemu/qemu_%.bbappend b/recipes-devtools/qemu/qemu_%.bbappend
new file mode 100644
index 0000000..96a45b8
--- /dev/null
+++ b/recipes-devtools/qemu/qemu_%.bbappend
@@ -0,0 +1,6 @@
1# look for files in the layer first
2FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
3
4SRC_URI += "file://0001-CVE-2017-2620.patch \
5 file://0002-CVE-2017-2620.patch \
6 "