diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2017-05-10 14:17:31 +0200 |
---|---|---|
committer | Adrian Dudau <adrian.dudau@enea.com> | 2017-05-11 15:28:36 +0200 |
commit | 07c94f74cda62c672e7e80292f917a76e1214be0 (patch) | |
tree | 2de451ef1dfb9fb55d90f1c4dcf5bf492dbce40e /meta/recipes-devtools/qemu/qemu/CVE-2016-2197.patch | |
parent | 3fc5d271f554e07c88b1195812e48a0d86291395 (diff) | |
download | poky-07c94f74cda62c672e7e80292f917a76e1214be0.tar.gz |
qemu: updgrade to 2.5.1
This upgrade includes several worthwhile fixes, security and otherwise, including
a complete fix for CVE-2016-2857.
* drop CVE-2016-2857.patch as it's included in this release, along with several
related patches which complete the fixes for CVE-2016-2857:
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=9bddb45dbc010cd8ee4d48bd501fa5d18dcec00c
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e3a2cdfcb5e282139217924044ec5af00c7f8eed
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=fe90bdc25bcf9954ee286cd51de94776a17d04f6
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=d0ee85b4e4c6cc2c8fac311d6df2ed412ed0df5f
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=80b6e5723fac428ea6c08c821078286f43975df8
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a375e0b03ee3438924b24a45e61ee189ec9361db
* drop CVE-2016-2197.patch as an equivalent fix is included in this release
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=aaf4fb6afb4653c86059255811886a5c4ea271f3
* drop CVE-2016-1568.patch as it's included in this release
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4f046a6ba1d558eb043dc13a80d40cf7cb62ef95
(From OE-Core rev: 8332cea4baf2bda81fa4d33ccedefaec4313d454)
This patch is backported from upstream morty branch:
http://git.yoctoproject.org/cgit/cgit.cgi/poky/patch/?id=c63c1aaaa6f2f2ad583e8e513308acab18841c83
Signed-off-by: Joshua Lock <joshua.g.lock@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Adrian Dudau <adrian.dudau@enea.com>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu/CVE-2016-2197.patch')
-rw-r--r-- | meta/recipes-devtools/qemu/qemu/CVE-2016-2197.patch | 59 |
1 files changed, 0 insertions, 59 deletions
diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2016-2197.patch b/meta/recipes-devtools/qemu/qemu/CVE-2016-2197.patch deleted file mode 100644 index 946435c430..0000000000 --- a/meta/recipes-devtools/qemu/qemu/CVE-2016-2197.patch +++ /dev/null | |||
@@ -1,59 +0,0 @@ | |||
1 | From: Prasad J Pandit <address@hidden> | ||
2 | |||
3 | When IDE AHCI emulation uses Frame Information Structures(FIS) | ||
4 | engine for data transfer, the mapped FIS buffer address is stored | ||
5 | in a static 'bounce.buffer'. When a request is made to map another | ||
6 | memory region, address_space_map() returns NULL because | ||
7 | 'bounce.buffer' is in_use. It leads to a null pointer dereference | ||
8 | error while doing 'dma_memory_unmap'. Add a check to avoid it. | ||
9 | |||
10 | Reported-by: Zuozhi fzz <address@hidden> | ||
11 | Signed-off-by: Prasad J Pandit <address@hidden> | ||
12 | |||
13 | Upstream-Status: Backport | ||
14 | https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05740.html | ||
15 | |||
16 | CVE: CVE-2016-2197 | ||
17 | Signed-off-by: Armin Kuster <akuster@mvista.com> | ||
18 | |||
19 | --- | ||
20 | hw/ide/ahci.c | 16 ++++++++++------ | ||
21 | 1 file changed, 10 insertions(+), 6 deletions(-) | ||
22 | |||
23 | Update as per review | ||
24 | -> https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05715.html | ||
25 | |||
26 | Index: qemu-2.5.0/hw/ide/ahci.c | ||
27 | =================================================================== | ||
28 | --- qemu-2.5.0.orig/hw/ide/ahci.c | ||
29 | +++ qemu-2.5.0/hw/ide/ahci.c | ||
30 | @@ -661,9 +661,11 @@ static bool ahci_map_fis_address(AHCIDev | ||
31 | |||
32 | static void ahci_unmap_fis_address(AHCIDevice *ad) | ||
33 | { | ||
34 | - dma_memory_unmap(ad->hba->as, ad->res_fis, 256, | ||
35 | - DMA_DIRECTION_FROM_DEVICE, 256); | ||
36 | - ad->res_fis = NULL; | ||
37 | + if (ad->res_fis) { | ||
38 | + dma_memory_unmap(ad->hba->as, ad->res_fis, 256, | ||
39 | + DMA_DIRECTION_FROM_DEVICE, 256); | ||
40 | + ad->res_fis = NULL; | ||
41 | + } | ||
42 | } | ||
43 | |||
44 | static bool ahci_map_clb_address(AHCIDevice *ad) | ||
45 | @@ -677,9 +679,11 @@ static bool ahci_map_clb_address(AHCIDev | ||
46 | |||
47 | static void ahci_unmap_clb_address(AHCIDevice *ad) | ||
48 | { | ||
49 | - dma_memory_unmap(ad->hba->as, ad->lst, 1024, | ||
50 | - DMA_DIRECTION_FROM_DEVICE, 1024); | ||
51 | - ad->lst = NULL; | ||
52 | + if (ad->lst) { | ||
53 | + dma_memory_unmap(ad->hba->as, ad->lst, 1024, | ||
54 | + DMA_DIRECTION_FROM_DEVICE, 1024); | ||
55 | + ad->lst = NULL; | ||
56 | + } | ||
57 | } | ||
58 | |||
59 | static void ahci_write_fis_sdb(AHCIState *s, NCQTransferState *ncq_tfs) | ||