[OE-core] [PATCH] Qemu: CVE-2018-11806 slirp heap buffer overflow

Burton, Ross ross.burton at intel.com
Thu Jun 14 13:18:34 UTC 2018


This patch needs an Upstream-Status: Backport and CVE tag in the
header (at the top of the patch from upstream).

Ross

On 14 June 2018 at 04:35, Jeremy Puhlman <jpuhlman at mvista.com> wrote:
> ---
>  ...018-11806-QEMU-slirp-heap-buffer-overflow.patch | 65 ++++++++++++++++++++++
>  meta/recipes-devtools/qemu/qemu_2.12.0.bb          |  1 +
>  2 files changed, 66 insertions(+)
>  create mode 100644 meta/recipes-devtools/qemu/qemu/0001-CVE-2018-11806-QEMU-slirp-heap-buffer-overflow.patch
>
> diff --git a/meta/recipes-devtools/qemu/qemu/0001-CVE-2018-11806-QEMU-slirp-heap-buffer-overflow.patch b/meta/recipes-devtools/qemu/qemu/0001-CVE-2018-11806-QEMU-slirp-heap-buffer-overflow.patch
> new file mode 100644
> index 0000000000..002a1332bf
> --- /dev/null
> +++ b/meta/recipes-devtools/qemu/qemu/0001-CVE-2018-11806-QEMU-slirp-heap-buffer-overflow.patch
> @@ -0,0 +1,65 @@
> +From dc21a9d2951f0a2a7e63633e2b5c68c54e4edc4b Mon Sep 17 00:00:00 2001
> +From: Jeremy Puhlman <jpuhlman at mvista.com>
> +Date: Thu, 14 Jun 2018 01:28:49 +0000
> +Subject: [PATCH] CVE-2018-11806 QEMU: slirp: heap buffer overflow
> +
> +Subject: [Qemu-devel] [PATCH 1/2] slirp: correct size computation while concatenating mbuf
> +Date:  Tue, 5 Jun 2018 23:38:35 +0530
> +From: Prasad J Pandit <address at hidden>
> +
> +While reassembling incoming fragmented datagrams, 'm_cat' routine
> +extends the 'mbuf' buffer, if it has insufficient room. It computes
> +a wrong buffer size, which leads to overwriting adjacent heap buffer
> +area. Correct this size computation in m_cat.
> +
> +Reported-by: ZDI Disclosures <address at hidden>
> +Signed-off-by: Prasad J Pandit <address at hidden>
> +---
> + slirp/mbuf.c | 8 ++++----
> + 1 file changed, 4 insertions(+), 4 deletions(-)
> +
> +Signed-off-by: Jeremy Puhlman <jpuhlman at mvista.com>
> +---
> + slirp/mbuf.c | 8 ++++----
> + 1 file changed, 4 insertions(+), 4 deletions(-)
> +
> +diff --git a/slirp/mbuf.c b/slirp/mbuf.c
> +index 5ff2455..7fb4501 100644
> +--- a/slirp/mbuf.c
> ++++ b/slirp/mbuf.c
> +@@ -138,7 +138,7 @@ m_cat(struct mbuf *m, struct mbuf *n)
> +        * If there's no room, realloc
> +        */
> +       if (M_FREEROOM(m) < n->m_len)
> +-              m_inc(m,m->m_size+MINCSIZE);
> ++               m_inc(m, m->m_len + n->m_len);
> +
> +       memcpy(m->m_data+m->m_len, n->m_data, n->m_len);
> +       m->m_len += n->m_len;
> +@@ -158,12 +158,12 @@ m_inc(struct mbuf *m, int size)
> +
> +         if (m->m_flags & M_EXT) {
> +         datasize = m->m_data - m->m_ext;
> +-          m->m_ext = g_realloc(m->m_ext, size);
> ++          m->m_ext = g_realloc(m->m_ext, size + datasize);
> +         m->m_data = m->m_ext + datasize;
> +         } else {
> +         char *dat;
> +         datasize = m->m_data - m->m_dat;
> +-          dat = g_malloc(size);
> ++          dat = g_malloc(size + datasize);
> +         memcpy(dat, m->m_dat, m->m_size);
> +
> +         m->m_ext = dat;
> +@@ -171,7 +171,7 @@ m_inc(struct mbuf *m, int size)
> +         m->m_flags |= M_EXT;
> +         }
> +
> +-        m->m_size = size;
> ++        m->m_size = size + datasize;
> +
> + }
> +
> +--
> +2.13.3
> +
> diff --git a/meta/recipes-devtools/qemu/qemu_2.12.0.bb b/meta/recipes-devtools/qemu/qemu_2.12.0.bb
> index 21796df9d7..98db44a8ef 100644
> --- a/meta/recipes-devtools/qemu/qemu_2.12.0.bb
> +++ b/meta/recipes-devtools/qemu/qemu_2.12.0.bb
> @@ -21,6 +21,7 @@ SRC_URI = "http://wiki.qemu-project.org/download/${BP}.tar.bz2 \
>             file://0009-apic-fixup-fallthrough-to-PIC.patch \
>             file://0010-linux-user-Fix-webkitgtk-hangs-on-32-bit-x86-target.patch \
>             file://0011-Revert-linux-user-fix-mmap-munmap-mprotect-mremap-sh.patch \
> +           file://0001-CVE-2018-11806-QEMU-slirp-heap-buffer-overflow.patch \
>             "
>  UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+\..*)\.tar"
>
> --
> 2.14.1.459.g238e487
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core at lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core



More information about the Openembedded-core mailing list