diff options
| author | Armin Kuster <akuster@mvista.com> | 2021-08-20 16:55:17 -0700 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-09-01 16:27:09 +0100 |
| commit | f721d78703d8ae18ccc61ac178353f00c133f362 (patch) | |
| tree | 80fbd41974aaeb7a7a2de9c294f0da08c4137416 | |
| parent | b3bf5ccd83f501f217713bb7c936a1e8817b92ba (diff) | |
| download | poky-f721d78703d8ae18ccc61ac178353f00c133f362.tar.gz | |
qemu: Security fix CVE-2021-20221
Source: Qemu.org
MR: 111643
Type: Security Fix
Disposition: Backport from https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a
ChangeID: b3ca1aa4b772a5f27f327250c5b0b988375c86a9
Description:
(From OE-Core rev: 4adf675e3d4ccdcee055a3c4b539f4ddc15b033d)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/recipes-devtools/qemu/qemu.inc | 1 | ||||
| -rw-r--r-- | meta/recipes-devtools/qemu/qemu/CVE-2021-20221.patch | 67 |
2 files changed, 68 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index bd1a83955f..ea654e0008 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc | |||
| @@ -60,6 +60,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ | |||
| 60 | file://CVE-2020-25624_2.patch \ | 60 | file://CVE-2020-25624_2.patch \ |
| 61 | file://CVE-2020-25625.patch \ | 61 | file://CVE-2020-25625.patch \ |
| 62 | file://CVE-2020-29443.patch \ | 62 | file://CVE-2020-29443.patch \ |
| 63 | file://CVE-2021-20221.patch \ | ||
| 63 | " | 64 | " |
| 64 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" | 65 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" |
| 65 | 66 | ||
diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2021-20221.patch b/meta/recipes-devtools/qemu/qemu/CVE-2021-20221.patch new file mode 100644 index 0000000000..46c9ab4184 --- /dev/null +++ b/meta/recipes-devtools/qemu/qemu/CVE-2021-20221.patch | |||
| @@ -0,0 +1,67 @@ | |||
| 1 | From edfe2eb4360cde4ed5d95bda7777edcb3510f76a Mon Sep 17 00:00:00 2001 | ||
| 2 | From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org> | ||
| 3 | Date: Sun, 31 Jan 2021 11:34:01 +0100 | ||
| 4 | Subject: [PATCH] hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register | ||
| 5 | MIME-Version: 1.0 | ||
| 6 | Content-Type: text/plain; charset=UTF-8 | ||
| 7 | Content-Transfer-Encoding: 8bit | ||
| 8 | |||
| 9 | Per the ARM Generic Interrupt Controller Architecture specification | ||
| 10 | (document "ARM IHI 0048B.b (ID072613)"), the SGIINTID field is 4 bit, | ||
| 11 | not 10: | ||
| 12 | |||
| 13 | - 4.3 Distributor register descriptions | ||
| 14 | - 4.3.15 Software Generated Interrupt Register, GICD_SG | ||
| 15 | |||
| 16 | - Table 4-21 GICD_SGIR bit assignments | ||
| 17 | |||
| 18 | The Interrupt ID of the SGI to forward to the specified CPU | ||
| 19 | interfaces. The value of this field is the Interrupt ID, in | ||
| 20 | the range 0-15, for example a value of 0b0011 specifies | ||
| 21 | Interrupt ID 3. | ||
| 22 | |||
| 23 | Correct the irq mask to fix an undefined behavior (which eventually | ||
| 24 | lead to a heap-buffer-overflow, see [Buglink]): | ||
| 25 | |||
| 26 | $ echo 'writel 0x8000f00 0xff4affb0' | qemu-system-aarch64 -M virt,accel=qtest -qtest stdio | ||
| 27 | [I 1612088147.116987] OPENED | ||
| 28 | [R +0.278293] writel 0x8000f00 0xff4affb0 | ||
| 29 | ../hw/intc/arm_gic.c:1498:13: runtime error: index 944 out of bounds for type 'uint8_t [16][8]' | ||
| 30 | SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior ../hw/intc/arm_gic.c:1498:13 | ||
| 31 | |||
| 32 | This fixes a security issue when running with KVM on Arm with | ||
| 33 | kernel-irqchip=off. (The default is kernel-irqchip=on, which is | ||
| 34 | unaffected, and which is also the correct choice for performance.) | ||
| 35 | |||
| 36 | Cc: qemu-stable@nongnu.org | ||
| 37 | Fixes: CVE-2021-20221 | ||
| 38 | Fixes: 9ee6e8bb853 ("ARMv7 support.") | ||
| 39 | Buglink: https://bugs.launchpad.net/qemu/+bug/1913916 | ||
| 40 | Buglink: https://bugs.launchpad.net/qemu/+bug/1913917 | ||
| 41 | Reported-by: Alexander Bulekov <alxndr@bu.edu> | ||
| 42 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
| 43 | Message-id: 20210131103401.217160-1-f4bug@amsat.org | ||
| 44 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
| 45 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
| 46 | |||
| 47 | Upstream-Status: Backport | ||
| 48 | CVE: CVE-2021-20221 | ||
| 49 | Signed-off-by: Armin Kuster <akuster@mvista.com> | ||
| 50 | |||
| 51 | --- | ||
| 52 | hw/intc/arm_gic.c | 2 +- | ||
| 53 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
| 54 | |||
| 55 | Index: qemu-4.2.0/hw/intc/arm_gic.c | ||
| 56 | =================================================================== | ||
| 57 | --- qemu-4.2.0.orig/hw/intc/arm_gic.c | ||
| 58 | +++ qemu-4.2.0/hw/intc/arm_gic.c | ||
| 59 | @@ -1455,7 +1455,7 @@ static void gic_dist_writel(void *opaque | ||
| 60 | int target_cpu; | ||
| 61 | |||
| 62 | cpu = gic_get_current_cpu(s); | ||
| 63 | - irq = value & 0x3ff; | ||
| 64 | + irq = value & 0xf; | ||
| 65 | switch ((value >> 24) & 3) { | ||
| 66 | case 0: | ||
| 67 | mask = (value >> 16) & ALL_CPU_MASK; | ||
