summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSakib Sajal <sakib.sajal@windriver.com>2021-08-10 23:08:48 -0400
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-08-18 18:00:24 +0100
commitf5e77d70e2eb35751f5bad5572b6eb8a3ab14422 (patch)
treec6d4295ffe58056718cab93ca004004dfc400d8c
parent460485d774480cd89cadf3b068f5197f44d86f25 (diff)
downloadpoky-f5e77d70e2eb35751f5bad5572b6eb8a3ab14422.tar.gz
qemu: fix CVE-2021-3608
(From OE-Core rev: 5e05ee8ff363eac84edec568039b86bcd716c6ce) Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com> Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-devtools/qemu/qemu.inc1
-rw-r--r--meta/recipes-devtools/qemu/qemu/CVE-2021-3608.patch43
2 files changed, 44 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc
index 0849196650..c3eecea9d4 100644
--- a/meta/recipes-devtools/qemu/qemu.inc
+++ b/meta/recipes-devtools/qemu/qemu.inc
@@ -68,6 +68,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \
68 file://CVE-2021-3527-2.patch \ 68 file://CVE-2021-3527-2.patch \
69 file://CVE-2021-3582.patch \ 69 file://CVE-2021-3582.patch \
70 file://CVE-2021-3607.patch \ 70 file://CVE-2021-3607.patch \
71 file://CVE-2021-3608.patch \
71 " 72 "
72UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" 73UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar"
73 74
diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2021-3608.patch b/meta/recipes-devtools/qemu/qemu/CVE-2021-3608.patch
new file mode 100644
index 0000000000..22d68b025d
--- /dev/null
+++ b/meta/recipes-devtools/qemu/qemu/CVE-2021-3608.patch
@@ -0,0 +1,43 @@
1From 66ae37d8cc313f89272e711174a846a229bcdbd3 Mon Sep 17 00:00:00 2001
2From: Marcel Apfelbaum <marcel.apfelbaum@gmail.com>
3Date: Wed, 30 Jun 2021 14:52:46 +0300
4Subject: [PATCH] pvrdma: Fix the ring init error flow (CVE-2021-3608)
5MIME-Version: 1.0
6Content-Type: text/plain; charset=UTF-8
7Content-Transfer-Encoding: 8bit
8
9Do not unmap uninitialized dma addresses.
10
11Fixes: CVE-2021-3608
12Reviewed-by: VictorV (Kunlun Lab) <vv474172261@gmail.com>
13Tested-by: VictorV (Kunlun Lab) <vv474172261@gmail.com>
14Signed-off-by: Marcel Apfelbaum <marcel@redhat.com>
15Message-Id: <20210630115246.2178219-1-marcel@redhat.com>
16Tested-by: Yuval Shaia <yuval.shaia.ml@gmail.com>
17Reviewed-by: Yuval Shaia <yuval.shaia.ml@gmail.com>
18Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
19Signed-off-by: Marcel Apfelbaum <marcel.apfelbaum@gmail.com>
20
21CVE: CVE-2021-3608
22Upstream-Status: Backport [66ae37d8cc313f89272e711174a846a229bcdbd3]
23Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com>
24---
25 hw/rdma/vmw/pvrdma_dev_ring.c | 2 +-
26 1 file changed, 1 insertion(+), 1 deletion(-)
27
28diff --git a/hw/rdma/vmw/pvrdma_dev_ring.c b/hw/rdma/vmw/pvrdma_dev_ring.c
29index 074ac59b84..42130667a7 100644
30--- a/hw/rdma/vmw/pvrdma_dev_ring.c
31+++ b/hw/rdma/vmw/pvrdma_dev_ring.c
32@@ -41,7 +41,7 @@ int pvrdma_ring_init(PvrdmaRing *ring, const char *name, PCIDevice *dev,
33 qatomic_set(&ring->ring_state->cons_head, 0);
34 */
35 ring->npages = npages;
36- ring->pages = g_malloc(npages * sizeof(void *));
37+ ring->pages = g_malloc0(npages * sizeof(void *));
38
39 for (i = 0; i < npages; i++) {
40 if (!tbl[i]) {
41--
422.25.1
43