[oe-commits] Daniel BORNAZ : qemu: security patch for CVE-2014-3471

git at git.openembedded.org git at git.openembedded.org
Fri Jul 18 23:09:30 UTC 2014


Module: openembedded-core.git
Branch: master
Commit: a84e1749b489cee5ea219799c35e29b6edead30f
URL:    http://git.openembedded.org/?p=openembedded-core.git&a=commit;h=a84e1749b489cee5ea219799c35e29b6edead30f

Author: Daniel BORNAZ <daniel.bornaz at enea.com>
Date:   Thu Jul 17 14:24:11 2014 +0200

qemu: security patch for CVE-2014-3471

Qemu PCIe bus support is vulnerable to a use-after-free flaw. It could
occur via guest, when it tries to hotplug/hotunplug devices on the
guest.

A user able to add & delete Virtio block devices on a guest could use
this flaw to crash the Qemu instance resulting in DoS.

Originated-by: Marcel Apfelbaum <address at hidden>

Updated the qemu recipe to include the security patch.

Upstream-Status: Submitted

Signed-off-by: Daniel BORNAZ <daniel.bornaz at enea.com>
Signed-off-by: Saul Wold <sgw at linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie at linuxfoundation.org>

---

 .../qemu/files/pcie_better_hotplug_support.patch   | 74 ++++++++++++++++++++++
 meta/recipes-devtools/qemu/qemu_2.0.0.bb           |  6 +-
 2 files changed, 79 insertions(+), 1 deletion(-)

diff --git a/meta/recipes-devtools/qemu/files/pcie_better_hotplug_support.patch b/meta/recipes-devtools/qemu/files/pcie_better_hotplug_support.patch
new file mode 100644
index 0000000..c7035b2
--- /dev/null
+++ b/meta/recipes-devtools/qemu/files/pcie_better_hotplug_support.patch
@@ -0,0 +1,74 @@
+The current code is broken: it does surprise removal which crashes guests.
+
+Reimplemented the steps:
+ - Hotplug triggers both 'present detect change' and
+   'attention button pressed'.
+
+ - Hotunplug starts by triggering 'attention button pressed',
+   then waits for the OS to power off the device and only
+   then detaches it.
+
+Fixes CVE-2014-3471.
+
+Originated-by: Marcel Apfelbaum <address at hidden>
+Updated-by: Daniel BORNAZ <daniel.bornaz at enea.com>
+
+--- a/hw/pci/pcie.c	2014-04-17 15:44:44.000000000 +0200
++++ b/hw/pci/pcie.c	2014-07-15 13:03:16.905070562 +0200
+@@ -258,7 +258,8 @@ void pcie_cap_slot_hotplug_cb(HotplugHan
+ 
+     pci_word_test_and_set_mask(exp_cap + PCI_EXP_SLTSTA,
+                                PCI_EXP_SLTSTA_PDS);
+-    pcie_cap_slot_event(PCI_DEVICE(hotplug_dev), PCI_EXP_HP_EV_PDC);
++    pcie_cap_slot_event(PCI_DEVICE(hotplug_dev),
++                        PCI_EXP_HP_EV_PDC | PCI_EXP_HP_EV_ABP);
+ }
+ 
+ void pcie_cap_slot_hot_unplug_cb(HotplugHandler *hotplug_dev, DeviceState *dev,
+@@ -268,10 +269,7 @@ void pcie_cap_slot_hot_unplug_cb(Hotplug
+ 
+     pcie_cap_slot_hotplug_common(PCI_DEVICE(hotplug_dev), dev, &exp_cap, errp);
+ 
+-    object_unparent(OBJECT(dev));
+-    pci_word_test_and_clear_mask(exp_cap + PCI_EXP_SLTSTA,
+-                                 PCI_EXP_SLTSTA_PDS);
+-    pcie_cap_slot_event(PCI_DEVICE(hotplug_dev), PCI_EXP_HP_EV_PDC);
++    pcie_cap_slot_push_attention_button(PCI_DEVICE(hotplug_dev));
+ }
+ 
+ /* pci express slot for pci express root/downstream port
+@@ -352,6 +350,11 @@ void pcie_cap_slot_reset(PCIDevice *dev)
+     hotplug_event_update_event_status(dev);
+ }
+ 
++static void pcie_unplug_device(PCIBus *bus, PCIDevice *dev, void *opaque)
++{
++    object_unparent(OBJECT(dev));
++}
++
+ void pcie_cap_slot_write_config(PCIDevice *dev,
+                                 uint32_t addr, uint32_t val, int len)
+ {
+@@ -376,6 +379,22 @@ void pcie_cap_slot_write_config(PCIDevic
+                         sltsta);
+     }
+ 
++    /*
++     * If the slot is polulated, power indicator is off and power
++     * controller is off, it is safe to detach the devices.
++     */
++    if ((sltsta & PCI_EXP_SLTSTA_PDS) && (val & PCI_EXP_SLTCTL_PCC) &&
++        ((val & PCI_EXP_SLTCTL_PIC_OFF) == PCI_EXP_SLTCTL_PIC_OFF)) {
++            PCIBus *sec_bus = pci_bridge_get_sec_bus(PCI_BRIDGE(dev));
++            pci_for_each_device(sec_bus, pci_bus_num(sec_bus),
++                                pcie_unplug_device, NULL);
++
++            pci_word_test_and_clear_mask(exp_cap + PCI_EXP_SLTSTA,
++                                         PCI_EXP_SLTSTA_PDS);
++            pci_word_test_and_set_mask(exp_cap + PCI_EXP_SLTSTA,
++                                       PCI_EXP_SLTSTA_PDC);
++    }
++
+     hotplug_event_notify(dev);
+ 
+     /* 
diff --git a/meta/recipes-devtools/qemu/qemu_2.0.0.bb b/meta/recipes-devtools/qemu/qemu_2.0.0.bb
index b8ce624..9a530a6 100644
--- a/meta/recipes-devtools/qemu/qemu_2.0.0.bb
+++ b/meta/recipes-devtools/qemu/qemu_2.0.0.bb
@@ -4,7 +4,11 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=441c28d2cf86e15a37fa47e15a72fbac \
                     file://COPYING.LIB;endline=24;md5=c04def7ae38850e7d3ef548588159913"
 
 SRC_URI += "file://qemu-enlarge-env-entry-size.patch \
-            file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch"
+            file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \
+            file://pcie_better_hotplug_support.patch \
+            "
+
+
 
 SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2"
 SRC_URI[md5sum] = "2790f44fd76da5de5024b4aafeb594c2"



More information about the Openembedded-commits mailing list