diff options
author | Lee Chee Yang <chee.yang.lee@intel.com> | 2020-06-01 21:40:37 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2020-06-26 18:26:48 +0100 |
commit | c9a3c7dd658990512016101f2352f259cdc33d26 (patch) | |
tree | c2edd6d5f4602a87d5f1577e82a67bc50ae5bf34 | |
parent | f59c4f0b836cc8ab3d83e154d8fdc885f81a019b (diff) | |
download | poky-c9a3c7dd658990512016101f2352f259cdc33d26.tar.gz |
qemu: fix CVE-2020-13361
(From OE-Core rev: 0e4985236dd7d2e92576fb30b70bc434a7ecd367)
Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 2dcef5dfb5c4c57fd793d04ac936a9ff73aae844)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/recipes-devtools/qemu/qemu.inc | 1 | ||||
-rw-r--r-- | meta/recipes-devtools/qemu/qemu/CVE-2020-13361.patch | 61 |
2 files changed, 62 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index 126e7d442c..3e5006937b 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc | |||
@@ -38,6 +38,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ | |||
38 | file://0001-qemu-Do-not-include-file-if-not-exists.patch \ | 38 | file://0001-qemu-Do-not-include-file-if-not-exists.patch \ |
39 | file://CVE-2020-11102.patch \ | 39 | file://CVE-2020-11102.patch \ |
40 | file://CVE-2020-11869.patch \ | 40 | file://CVE-2020-11869.patch \ |
41 | file://CVE-2020-13361.patch \ | ||
41 | " | 42 | " |
42 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" | 43 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" |
43 | 44 | ||
diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2020-13361.patch b/meta/recipes-devtools/qemu/qemu/CVE-2020-13361.patch new file mode 100644 index 0000000000..e0acc70f3c --- /dev/null +++ b/meta/recipes-devtools/qemu/qemu/CVE-2020-13361.patch | |||
@@ -0,0 +1,61 @@ | |||
1 | From 369ff955a8497988d079c4e3fa1e93c2570c1c69 Mon Sep 17 00:00:00 2001 | ||
2 | From: Prasad J Pandit <pjp@fedoraproject.org> | ||
3 | Date: Fri, 15 May 2020 01:36:08 +0530 | ||
4 | Subject: [PATCH] es1370: check total frame count against current frame | ||
5 | |||
6 | A guest user may set channel frame count via es1370_write() | ||
7 | such that, in es1370_transfer_audio(), total frame count | ||
8 | 'size' is lesser than the number of frames that are processed | ||
9 | 'cnt'. | ||
10 | |||
11 | int cnt = d->frame_cnt >> 16; | ||
12 | int size = d->frame_cnt & 0xffff; | ||
13 | |||
14 | if (size < cnt), it results in incorrect calculations leading | ||
15 | to OOB access issue(s). Add check to avoid it. | ||
16 | |||
17 | Reported-by: Ren Ding <rding@gatech.edu> | ||
18 | Reported-by: Hanqing Zhao <hanqing@gatech.edu> | ||
19 | Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> | ||
20 | Message-id: 20200514200608.1744203-1-ppandit@redhat.com | ||
21 | Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | ||
22 | |||
23 | Upstream-Status: Backport [https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html] | ||
24 | CVE: CVE-2020-13361 | ||
25 | Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com> | ||
26 | --- | ||
27 | hw/audio/es1370.c | 7 +++++-- | ||
28 | 1 file changed, 5 insertions(+), 2 deletions(-) | ||
29 | |||
30 | diff --git a/hw/audio/es1370.c b/hw/audio/es1370.c | ||
31 | index 89c4dabcd44..5f8a83ff562 100644 | ||
32 | --- a/hw/audio/es1370.c | ||
33 | +++ b/hw/audio/es1370.c | ||
34 | @@ -643,6 +643,9 @@ static void es1370_transfer_audio (ES1370State *s, struct chan *d, int loop_sel, | ||
35 | int csc_bytes = (csc + 1) << d->shift; | ||
36 | int cnt = d->frame_cnt >> 16; | ||
37 | int size = d->frame_cnt & 0xffff; | ||
38 | + if (size < cnt) { | ||
39 | + return; | ||
40 | + } | ||
41 | int left = ((size - cnt + 1) << 2) + d->leftover; | ||
42 | int transferred = 0; | ||
43 | int temp = MIN (max, MIN (left, csc_bytes)); | ||
44 | @@ -651,7 +654,7 @@ static void es1370_transfer_audio (ES1370State *s, struct chan *d, int loop_sel, | ||
45 | addr += (cnt << 2) + d->leftover; | ||
46 | |||
47 | if (index == ADC_CHANNEL) { | ||
48 | - while (temp) { | ||
49 | + while (temp > 0) { | ||
50 | int acquired, to_copy; | ||
51 | |||
52 | to_copy = MIN ((size_t) temp, sizeof (tmpbuf)); | ||
53 | @@ -669,7 +672,7 @@ static void es1370_transfer_audio (ES1370State *s, struct chan *d, int loop_sel, | ||
54 | else { | ||
55 | SWVoiceOut *voice = s->dac_voice[index]; | ||
56 | |||
57 | - while (temp) { | ||
58 | + while (temp > 0) { | ||
59 | int copied, to_copy; | ||
60 | |||
61 | to_copy = MIN ((size_t) temp, sizeof (tmpbuf)); | ||