summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-01-29 12:35:17 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-01-30 12:13:09 +0000
commit4922f470dd48a7191ea7b305b9b3ba9d98305835 (patch)
treed70acb4386c99a5539c9c8803c5cbb946ce678bd /meta/recipes-devtools
parent3ec0e95feda67c1600a8da45eb963078aa020fa2 (diff)
downloadpoky-4922f470dd48a7191ea7b305b9b3ba9d98305835.tar.gz
qemu: Security fix CVE-2015-7504
CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in loopback mode (From OE-Core rev: b01b569d7d7e651a35fa38750462f13aeb64a2f3) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools')
-rw-r--r--meta/recipes-devtools/qemu/qemu/CVE-2015-7504.patch56
-rw-r--r--meta/recipes-devtools/qemu/qemu_2.4.0.bb1
2 files changed, 57 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2015-7504.patch b/meta/recipes-devtools/qemu/qemu/CVE-2015-7504.patch
new file mode 100644
index 0000000000..90a7947abb
--- /dev/null
+++ b/meta/recipes-devtools/qemu/qemu/CVE-2015-7504.patch
@@ -0,0 +1,56 @@
1From 837f21aacf5a714c23ddaadbbc5212f9b661e3f7 Mon Sep 17 00:00:00 2001
2From: Prasad J Pandit <pjp@fedoraproject.org>
3Date: Fri, 20 Nov 2015 11:50:31 +0530
4Subject: [PATCH] net: pcnet: add check to validate receive data
5 size(CVE-2015-7504)
6
7In loopback mode, pcnet_receive routine appends CRC code to the
8receive buffer. If the data size given is same as the buffer size,
9the appended CRC code overwrites 4 bytes after s->buffer. Added a
10check to avoid that.
11
12Reported by: Qinghao Tang <luodalongde@gmail.com>
13Cc: qemu-stable@nongnu.org
14Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
15Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
16Signed-off-by: Jason Wang <jasowang@redhat.com>
17
18Upstream-Status: Backport
19
20http://git.qemu.org/?p=qemu.git;a=commit;h=837f21aacf5a714c23ddaadbbc5212f9b661e3f7
21
22CVE: CVE-2015-7504
23[Yocto # 9013]
24
25Signed-off-by: Armin Kuster <akuster@mvista.com>
26
27---
28 hw/net/pcnet.c | 8 +++++---
29 1 file changed, 5 insertions(+), 3 deletions(-)
30
31Index: qemu-2.4.0/hw/net/pcnet.c
32===================================================================
33--- qemu-2.4.0.orig/hw/net/pcnet.c
34+++ qemu-2.4.0/hw/net/pcnet.c
35@@ -1085,7 +1085,7 @@ ssize_t pcnet_receive(NetClientState *nc
36 uint32_t fcs = ~0;
37 uint8_t *p = src;
38
39- while (p != &src[size-4])
40+ while (p != &src[size])
41 CRC(fcs, *p++);
42 crc_err = (*(uint32_t *)p != htonl(fcs));
43 }
44@@ -1234,8 +1234,10 @@ static void pcnet_transmit(PCNetState *s
45 bcnt = 4096 - GET_FIELD(tmd.length, TMDL, BCNT);
46
47 /* if multi-tmd packet outsizes s->buffer then skip it silently.
48- Note: this is not what real hw does */
49- if (s->xmit_pos + bcnt > sizeof(s->buffer)) {
50+ * Note: this is not what real hw does.
51+ * Last four bytes of s->buffer are used to store CRC FCS code.
52+ */
53+ if (s->xmit_pos + bcnt > sizeof(s->buffer) - 4) {
54 s->xmit_pos = -1;
55 goto txdone;
56 }
diff --git a/meta/recipes-devtools/qemu/qemu_2.4.0.bb b/meta/recipes-devtools/qemu/qemu_2.4.0.bb
index fec1061212..58ce3b59de 100644
--- a/meta/recipes-devtools/qemu/qemu_2.4.0.bb
+++ b/meta/recipes-devtools/qemu/qemu_2.4.0.bb
@@ -11,6 +11,7 @@ SRC_URI += "file://configure-fix-Darwin-target-detection.patch \
11 file://smc91c111_fix3.patch \ 11 file://smc91c111_fix3.patch \
12 file://no-valgrind.patch \ 12 file://no-valgrind.patch \
13 file://CVE-2015-8504.patch \ 13 file://CVE-2015-8504.patch \
14 file://CVE-2015-7504.patch \
14 " 15 "
15SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2" 16SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2"
16SRC_URI[md5sum] = "186ee8194140a484a455f8e3c74589f4" 17SRC_URI[md5sum] = "186ee8194140a484a455f8e3c74589f4"