From: @yezengruan Reviewed-by: @kevinzhu1 Signed-off-by: @kevinzhu1
This commit is contained in:
commit
74c6c057fa
38
display-qxl-render-fix-race-condition-in-qxl_cursor-.patch
Normal file
38
display-qxl-render-fix-race-condition-in-qxl_cursor-.patch
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
From 98c106af8a2f761f615690494b425aed57b308db Mon Sep 17 00:00:00 2001
|
||||||
|
From: Mauro Matteo Cascella <mcascell@redhat.com>
|
||||||
|
Date: Thu, 7 Apr 2022 10:11:06 +0200
|
||||||
|
Subject: [PATCH 1/2] display/qxl-render: fix race condition in qxl_cursor
|
||||||
|
(CVE-2021-4207)
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=UTF-8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
Avoid fetching 'width' and 'height' a second time to prevent possible
|
||||||
|
race condition. Refer to security advisory
|
||||||
|
https://starlabs.sg/advisories/22-4207/ for more information.
|
||||||
|
|
||||||
|
Fixes: CVE-2021-4207
|
||||||
|
Signed-off-by: Mauro Matteo Cascella <mcascell@redhat.com>
|
||||||
|
Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
||||||
|
Message-Id: <20220407081106.343235-1-mcascell@redhat.com>
|
||||||
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
---
|
||||||
|
hw/display/qxl-render.c | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/hw/display/qxl-render.c b/hw/display/qxl-render.c
|
||||||
|
index d28849b121..237ed293ba 100644
|
||||||
|
--- a/hw/display/qxl-render.c
|
||||||
|
+++ b/hw/display/qxl-render.c
|
||||||
|
@@ -266,7 +266,7 @@ static QEMUCursor *qxl_cursor(PCIQXLDevice *qxl, QXLCursor *cursor,
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case SPICE_CURSOR_TYPE_ALPHA:
|
||||||
|
- size = sizeof(uint32_t) * cursor->header.width * cursor->header.height;
|
||||||
|
+ size = sizeof(uint32_t) * c->width * c->height;
|
||||||
|
qxl_unpack_chunks(c->data, size, qxl, &cursor->chunk, group_id);
|
||||||
|
if (qxl->debug > 2) {
|
||||||
|
cursor_print_ascii_art(c, "qxl/alpha");
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
@ -1,6 +1,6 @@
|
|||||||
Name: qemu
|
Name: qemu
|
||||||
Version: 6.2.0
|
Version: 6.2.0
|
||||||
Release: 33
|
Release: 34
|
||||||
Epoch: 2
|
Epoch: 2
|
||||||
Summary: QEMU is a generic and open source machine emulator and virtualizer
|
Summary: QEMU is a generic and open source machine emulator and virtualizer
|
||||||
License: GPLv2 and BSD and MIT and CC-BY-SA-4.0
|
License: GPLv2 and BSD and MIT and CC-BY-SA-4.0
|
||||||
@ -242,6 +242,8 @@ Patch0228: Revert-monitor-limit-io-error-qmp-event-to-at-most-o.patch
|
|||||||
Patch0229: vhost-vsock-detach-the-virqueue-element-in-case-of-e.patch
|
Patch0229: vhost-vsock-detach-the-virqueue-element-in-case-of-e.patch
|
||||||
Patch0230: virtio-net-fix-map-leaking-on-error-during-receive.patch
|
Patch0230: virtio-net-fix-map-leaking-on-error-during-receive.patch
|
||||||
Patch0231: vfio-pci-Ascend710-change-to-bar2-quirk.patch
|
Patch0231: vfio-pci-Ascend710-change-to-bar2-quirk.patch
|
||||||
|
Patch0232: display-qxl-render-fix-race-condition-in-qxl_cursor-.patch
|
||||||
|
Patch0233: ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2.patch
|
||||||
|
|
||||||
BuildRequires: flex
|
BuildRequires: flex
|
||||||
BuildRequires: gcc
|
BuildRequires: gcc
|
||||||
@ -702,6 +704,10 @@ getent passwd qemu >/dev/null || \
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue May 10 2022 yezengruan <yezengruan@huawei.com> - 2:6.2.0-34
|
||||||
|
- display/qxl-render: fix race condition in qxl_cursor (CVE-2021-4207)
|
||||||
|
- ui/cursor: fix integer overflow in cursor_alloc (CVE-2021-4206)
|
||||||
|
|
||||||
* Wed Apr 27 2022 yezengruan <yezengruan@huawei.com> - 6.2.0-33
|
* Wed Apr 27 2022 yezengruan <yezengruan@huawei.com> - 6.2.0-33
|
||||||
- update the format of changelog
|
- update the format of changelog
|
||||||
|
|
||||||
|
|||||||
84
ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2.patch
Normal file
84
ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2.patch
Normal file
@ -0,0 +1,84 @@
|
|||||||
|
From 7da437c2f5440a9230e482d58d86b579221b3207 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Mauro Matteo Cascella <mcascell@redhat.com>
|
||||||
|
Date: Thu, 7 Apr 2022 10:17:12 +0200
|
||||||
|
Subject: [PATCH 2/2] ui/cursor: fix integer overflow in cursor_alloc
|
||||||
|
(CVE-2021-4206)
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=UTF-8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
Prevent potential integer overflow by limiting 'width' and 'height' to
|
||||||
|
512x512. Also change 'datasize' type to size_t. Refer to security
|
||||||
|
advisory https://starlabs.sg/advisories/22-4206/ for more information.
|
||||||
|
|
||||||
|
Fixes: CVE-2021-4206
|
||||||
|
Signed-off-by: Mauro Matteo Cascella <mcascell@redhat.com>
|
||||||
|
Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
||||||
|
Message-Id: <20220407081712.345609-1-mcascell@redhat.com>
|
||||||
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||||
|
---
|
||||||
|
hw/display/qxl-render.c | 7 +++++++
|
||||||
|
hw/display/vmware_vga.c | 2 ++
|
||||||
|
ui/cursor.c | 8 +++++++-
|
||||||
|
3 files changed, 16 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/hw/display/qxl-render.c b/hw/display/qxl-render.c
|
||||||
|
index 237ed293ba..ca217004bf 100644
|
||||||
|
--- a/hw/display/qxl-render.c
|
||||||
|
+++ b/hw/display/qxl-render.c
|
||||||
|
@@ -247,6 +247,13 @@ static QEMUCursor *qxl_cursor(PCIQXLDevice *qxl, QXLCursor *cursor,
|
||||||
|
size_t size;
|
||||||
|
|
||||||
|
c = cursor_alloc(cursor->header.width, cursor->header.height);
|
||||||
|
+
|
||||||
|
+ if (!c) {
|
||||||
|
+ qxl_set_guest_bug(qxl, "%s: cursor %ux%u alloc error", __func__,
|
||||||
|
+ cursor->header.width, cursor->header.height);
|
||||||
|
+ goto fail;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
c->hot_x = cursor->header.hot_spot_x;
|
||||||
|
c->hot_y = cursor->header.hot_spot_y;
|
||||||
|
switch (cursor->header.type) {
|
||||||
|
diff --git a/hw/display/vmware_vga.c b/hw/display/vmware_vga.c
|
||||||
|
index e2969a6c81..2b81d6122f 100644
|
||||||
|
--- a/hw/display/vmware_vga.c
|
||||||
|
+++ b/hw/display/vmware_vga.c
|
||||||
|
@@ -509,6 +509,8 @@ static inline void vmsvga_cursor_define(struct vmsvga_state_s *s,
|
||||||
|
int i, pixels;
|
||||||
|
|
||||||
|
qc = cursor_alloc(c->width, c->height);
|
||||||
|
+ assert(qc != NULL);
|
||||||
|
+
|
||||||
|
qc->hot_x = c->hot_x;
|
||||||
|
qc->hot_y = c->hot_y;
|
||||||
|
switch (c->bpp) {
|
||||||
|
diff --git a/ui/cursor.c b/ui/cursor.c
|
||||||
|
index 1d62ddd4d0..835f0802f9 100644
|
||||||
|
--- a/ui/cursor.c
|
||||||
|
+++ b/ui/cursor.c
|
||||||
|
@@ -46,6 +46,8 @@ static QEMUCursor *cursor_parse_xpm(const char *xpm[])
|
||||||
|
|
||||||
|
/* parse pixel data */
|
||||||
|
c = cursor_alloc(width, height);
|
||||||
|
+ assert(c != NULL);
|
||||||
|
+
|
||||||
|
for (pixel = 0, y = 0; y < height; y++, line++) {
|
||||||
|
for (x = 0; x < height; x++, pixel++) {
|
||||||
|
idx = xpm[line][x];
|
||||||
|
@@ -91,7 +93,11 @@ QEMUCursor *cursor_builtin_left_ptr(void)
|
||||||
|
QEMUCursor *cursor_alloc(int width, int height)
|
||||||
|
{
|
||||||
|
QEMUCursor *c;
|
||||||
|
- int datasize = width * height * sizeof(uint32_t);
|
||||||
|
+ size_t datasize = width * height * sizeof(uint32_t);
|
||||||
|
+
|
||||||
|
+ if (width > 512 || height > 512) {
|
||||||
|
+ return NULL;
|
||||||
|
+ }
|
||||||
|
|
||||||
|
c = g_malloc0(sizeof(QEMUCursor) + datasize);
|
||||||
|
c->width = width;
|
||||||
|
--
|
||||||
|
2.27.0
|
||||||
|
|
||||||
Loading…
x
Reference in New Issue
Block a user