import qemu-kvm-6.2.0-21.module+el8.7.0+17573+effbd7e8.2
This commit is contained in:
		
							parent
							
								
									97d5b9938f
								
							
						
					
					
						commit
						cb066cbf03
					
				| @ -0,0 +1,52 @@ | |||||||
|  | From a77c0c98570dbfcd0376d115733393b3658ffff9 Mon Sep 17 00:00:00 2001 | ||||||
|  | From: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | Date: Mon, 5 Dec 2022 15:32:55 -0500 | ||||||
|  | Subject: [PATCH 6/6] hw/display/qxl: Assert memory slot fits in preallocated | ||||||
|  |  MemoryRegion | ||||||
|  | MIME-Version: 1.0 | ||||||
|  | Content-Type: text/plain; charset=UTF-8 | ||||||
|  | Content-Transfer-Encoding: 8bit | ||||||
|  | 
 | ||||||
|  | RH-Author: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | RH-MergeRequest: 242: hw/display/qxl: Have qxl_log_command Return early if no log_cmd handler | ||||||
|  | RH-Bugzilla: 2152085 | ||||||
|  | RH-Acked-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  | RH-Acked-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  | RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  | RH-Commit: [5/5] 90eb0289592bedb0c9c087190083c85b042f8908 (jmaloy/jons-qemu-kvm) | ||||||
|  | 
 | ||||||
|  | BZ: https://bugzilla.redhat.com/show_bug.cgi?id=2152085 | ||||||
|  | CVE: CVE-2022-4144 | ||||||
|  | Upstream: Merged | ||||||
|  | 
 | ||||||
|  | commit 86fdb0582c653a9824183679403a85f588260d62 | ||||||
|  | Author: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  | Date:   Mon Nov 28 21:27:41 2022 +0100 | ||||||
|  | 
 | ||||||
|  |     hw/display/qxl: Assert memory slot fits in preallocated MemoryRegion | ||||||
|  | 
 | ||||||
|  |     Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  |     Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  |     Message-Id: <20221128202741.4945-6-philmd@linaro.org> | ||||||
|  | 
 | ||||||
|  | (cherry picked from commit 86fdb0582c653a9824183679403a85f588260d62) | ||||||
|  | Signed-off-by: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | ---
 | ||||||
|  |  hw/display/qxl.c | 1 + | ||||||
|  |  1 file changed, 1 insertion(+) | ||||||
|  | 
 | ||||||
|  | diff --git a/hw/display/qxl.c b/hw/display/qxl.c
 | ||||||
|  | index 2a4b2d4158..bcd9e8716a 100644
 | ||||||
|  | --- a/hw/display/qxl.c
 | ||||||
|  | +++ b/hw/display/qxl.c
 | ||||||
|  | @@ -1372,6 +1372,7 @@ static int qxl_add_memslot(PCIQXLDevice *d, uint32_t slot_id, uint64_t delta,
 | ||||||
|  |          qxl_set_guest_bug(d, "%s: pci_region = %d", __func__, pci_region); | ||||||
|  |          return 1; | ||||||
|  |      } | ||||||
|  | +    assert(guest_end - pci_start <= memory_region_size(mr));
 | ||||||
|  |   | ||||||
|  |      virt_start = (intptr_t)memory_region_get_ram_ptr(mr); | ||||||
|  |      memslot.slot_id = slot_id; | ||||||
|  | -- 
 | ||||||
|  | 2.37.3 | ||||||
|  | 
 | ||||||
| @ -0,0 +1,130 @@ | |||||||
|  | From e3fcb7370760b801f52907ae5bb385cebe2e2e1c Mon Sep 17 00:00:00 2001 | ||||||
|  | From: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | Date: Mon, 5 Dec 2022 15:32:55 -0500 | ||||||
|  | Subject: [PATCH 5/6] hw/display/qxl: Avoid buffer overrun in qxl_phys2virt | ||||||
|  |  (CVE-2022-4144) | ||||||
|  | MIME-Version: 1.0 | ||||||
|  | Content-Type: text/plain; charset=UTF-8 | ||||||
|  | Content-Transfer-Encoding: 8bit | ||||||
|  | 
 | ||||||
|  | RH-Author: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | RH-MergeRequest: 242: hw/display/qxl: Have qxl_log_command Return early if no log_cmd handler | ||||||
|  | RH-Bugzilla: 2152085 | ||||||
|  | RH-Acked-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  | RH-Acked-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  | RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  | RH-Commit: [4/5] 50e06fe6db196d327a68c7d7f35239404fbb39ee (jmaloy/jons-qemu-kvm) | ||||||
|  | 
 | ||||||
|  | BZ: https://bugzilla.redhat.com/show_bug.cgi?id=2152085 | ||||||
|  | CVE: CVE-2022-4144 | ||||||
|  | Upstream: Merged | ||||||
|  | 
 | ||||||
|  | commit 6dbbf055148c6f1b7d8a3251a65bd6f3d1e1f622 | ||||||
|  | Author: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  | Date:   Mon Nov 28 21:27:40 2022 +0100 | ||||||
|  | 
 | ||||||
|  |     hw/display/qxl: Avoid buffer overrun in qxl_phys2virt (CVE-2022-4144) | ||||||
|  | 
 | ||||||
|  |     Have qxl_get_check_slot_offset() return false if the requested | ||||||
|  |     buffer size does not fit within the slot memory region. | ||||||
|  | 
 | ||||||
|  |     Similarly qxl_phys2virt() now returns NULL in such case, and | ||||||
|  |     qxl_dirty_one_surface() aborts. | ||||||
|  | 
 | ||||||
|  |     This avoids buffer overrun in the host pointer returned by | ||||||
|  |     memory_region_get_ram_ptr(). | ||||||
|  | 
 | ||||||
|  |     Fixes: CVE-2022-4144 (out-of-bounds read) | ||||||
|  |     Reported-by: Wenxu Yin (@awxylitol) | ||||||
|  |     Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1336 | ||||||
|  |     Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  |     Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  |     Message-Id: <20221128202741.4945-5-philmd@linaro.org> | ||||||
|  | 
 | ||||||
|  | (cherry picked from commit 6dbbf055148c6f1b7d8a3251a65bd6f3d1e1f622) | ||||||
|  | Signed-off-by: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | ---
 | ||||||
|  |  hw/display/qxl.c | 27 +++++++++++++++++++++++---- | ||||||
|  |  hw/display/qxl.h |  2 +- | ||||||
|  |  2 files changed, 24 insertions(+), 5 deletions(-) | ||||||
|  | 
 | ||||||
|  | diff --git a/hw/display/qxl.c b/hw/display/qxl.c
 | ||||||
|  | index aa9065183e..2a4b2d4158 100644
 | ||||||
|  | --- a/hw/display/qxl.c
 | ||||||
|  | +++ b/hw/display/qxl.c
 | ||||||
|  | @@ -1412,11 +1412,13 @@ static void qxl_reset_surfaces(PCIQXLDevice *d)
 | ||||||
|  |   | ||||||
|  |  /* can be also called from spice server thread context */ | ||||||
|  |  static bool qxl_get_check_slot_offset(PCIQXLDevice *qxl, QXLPHYSICAL pqxl, | ||||||
|  | -                                      uint32_t *s, uint64_t *o)
 | ||||||
|  | +                                      uint32_t *s, uint64_t *o,
 | ||||||
|  | +                                      size_t size_requested)
 | ||||||
|  |  { | ||||||
|  |      uint64_t phys   = le64_to_cpu(pqxl); | ||||||
|  |      uint32_t slot   = (phys >> (64 -  8)) & 0xff; | ||||||
|  |      uint64_t offset = phys & 0xffffffffffff; | ||||||
|  | +    uint64_t size_available;
 | ||||||
|  |   | ||||||
|  |      if (slot >= NUM_MEMSLOTS) { | ||||||
|  |          qxl_set_guest_bug(qxl, "slot too large %d >= %d", slot, | ||||||
|  | @@ -1440,6 +1442,23 @@ static bool qxl_get_check_slot_offset(PCIQXLDevice *qxl, QXLPHYSICAL pqxl,
 | ||||||
|  |                            slot, offset, qxl->guest_slots[slot].size); | ||||||
|  |          return false; | ||||||
|  |      } | ||||||
|  | +    size_available = memory_region_size(qxl->guest_slots[slot].mr);
 | ||||||
|  | +    if (qxl->guest_slots[slot].offset + offset >= size_available) {
 | ||||||
|  | +        qxl_set_guest_bug(qxl,
 | ||||||
|  | +                          "slot %d offset %"PRIu64" > region size %"PRIu64"\n",
 | ||||||
|  | +                          slot, qxl->guest_slots[slot].offset + offset,
 | ||||||
|  | +                          size_available);
 | ||||||
|  | +        return false;
 | ||||||
|  | +    }
 | ||||||
|  | +    size_available -= qxl->guest_slots[slot].offset + offset;
 | ||||||
|  | +    if (size_requested > size_available) {
 | ||||||
|  | +        qxl_set_guest_bug(qxl,
 | ||||||
|  | +                          "slot %d offset %"PRIu64" size %zu: "
 | ||||||
|  | +                          "overrun by %"PRIu64" bytes\n",
 | ||||||
|  | +                          slot, offset, size_requested,
 | ||||||
|  | +                          size_requested - size_available);
 | ||||||
|  | +        return false;
 | ||||||
|  | +    }
 | ||||||
|  |   | ||||||
|  |      *s = slot; | ||||||
|  |      *o = offset; | ||||||
|  | @@ -1459,7 +1478,7 @@ void *qxl_phys2virt(PCIQXLDevice *qxl, QXLPHYSICAL pqxl, int group_id,
 | ||||||
|  |          offset = le64_to_cpu(pqxl) & 0xffffffffffff; | ||||||
|  |          return (void *)(intptr_t)offset; | ||||||
|  |      case MEMSLOT_GROUP_GUEST: | ||||||
|  | -        if (!qxl_get_check_slot_offset(qxl, pqxl, &slot, &offset)) {
 | ||||||
|  | +        if (!qxl_get_check_slot_offset(qxl, pqxl, &slot, &offset, size)) {
 | ||||||
|  |              return NULL; | ||||||
|  |          } | ||||||
|  |          ptr = memory_region_get_ram_ptr(qxl->guest_slots[slot].mr); | ||||||
|  | @@ -1925,9 +1944,9 @@ static void qxl_dirty_one_surface(PCIQXLDevice *qxl, QXLPHYSICAL pqxl,
 | ||||||
|  |      uint32_t slot; | ||||||
|  |      bool rc; | ||||||
|  |   | ||||||
|  | -    rc = qxl_get_check_slot_offset(qxl, pqxl, &slot, &offset);
 | ||||||
|  | -    assert(rc == true);
 | ||||||
|  |      size = (uint64_t)height * abs(stride); | ||||||
|  | +    rc = qxl_get_check_slot_offset(qxl, pqxl, &slot, &offset, size);
 | ||||||
|  | +    assert(rc == true);
 | ||||||
|  |      trace_qxl_surfaces_dirty(qxl->id, offset, size); | ||||||
|  |      qxl_set_dirty(qxl->guest_slots[slot].mr, | ||||||
|  |                    qxl->guest_slots[slot].offset + offset, | ||||||
|  | diff --git a/hw/display/qxl.h b/hw/display/qxl.h
 | ||||||
|  | index c784315daa..89ca832cf9 100644
 | ||||||
|  | --- a/hw/display/qxl.h
 | ||||||
|  | +++ b/hw/display/qxl.h
 | ||||||
|  | @@ -157,7 +157,7 @@ OBJECT_DECLARE_SIMPLE_TYPE(PCIQXLDevice, PCI_QXL)
 | ||||||
|  |   * | ||||||
|  |   * Returns a host pointer to a buffer placed at offset @phys within the | ||||||
|  |   * active slot @group_id of the PCI VGA RAM memory region associated with | ||||||
|  | - * the @qxl device. If the slot is inactive, or the offset is out
 | ||||||
|  | + * the @qxl device. If the slot is inactive, or the offset + size are out
 | ||||||
|  |   * of the memory region, returns NULL. | ||||||
|  |   * | ||||||
|  |   * Use with care; by the time this function returns, the returned pointer is | ||||||
|  | -- 
 | ||||||
|  | 2.37.3 | ||||||
|  | 
 | ||||||
							
								
								
									
										70
									
								
								SOURCES/kvm-hw-display-qxl-Document-qxl_phys2virt.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										70
									
								
								SOURCES/kvm-hw-display-qxl-Document-qxl_phys2virt.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,70 @@ | |||||||
|  | From ef0563a3c3f32680e0584821eccd9a205e371b34 Mon Sep 17 00:00:00 2001 | ||||||
|  | From: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | Date: Mon, 5 Dec 2022 15:32:55 -0500 | ||||||
|  | Subject: [PATCH 3/6] hw/display/qxl: Document qxl_phys2virt() | ||||||
|  | MIME-Version: 1.0 | ||||||
|  | Content-Type: text/plain; charset=UTF-8 | ||||||
|  | Content-Transfer-Encoding: 8bit | ||||||
|  | 
 | ||||||
|  | RH-Author: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | RH-MergeRequest: 242: hw/display/qxl: Have qxl_log_command Return early if no log_cmd handler | ||||||
|  | RH-Bugzilla: 2152085 | ||||||
|  | RH-Acked-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  | RH-Acked-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  | RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  | RH-Commit: [2/5] 8d1045449270a3aef4bc4b39c61da1592b83259a (jmaloy/jons-qemu-kvm) | ||||||
|  | 
 | ||||||
|  | BZ: https://bugzilla.redhat.com/show_bug.cgi?id=2152085 | ||||||
|  | CVE: CVE-2022-4144 | ||||||
|  | Upstream: Merged | ||||||
|  | 
 | ||||||
|  | commit b1901de83a9456cde26fc755f71ca2b7b3ef50fc | ||||||
|  | Author: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  | Date:   Mon Nov 28 21:27:38 2022 +0100 | ||||||
|  | 
 | ||||||
|  |     hw/display/qxl: Document qxl_phys2virt() | ||||||
|  | 
 | ||||||
|  |     Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  |     Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  |     Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  |     Message-Id: <20221128202741.4945-3-philmd@linaro.org> | ||||||
|  | 
 | ||||||
|  | (cherry picked from commit b1901de83a9456cde26fc755f71ca2b7b3ef50fc) | ||||||
|  | Signed-off-by: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | ---
 | ||||||
|  |  hw/display/qxl.h | 19 +++++++++++++++++++ | ||||||
|  |  1 file changed, 19 insertions(+) | ||||||
|  | 
 | ||||||
|  | diff --git a/hw/display/qxl.h b/hw/display/qxl.h
 | ||||||
|  | index 30d21f4d0b..c938f88a2f 100644
 | ||||||
|  | --- a/hw/display/qxl.h
 | ||||||
|  | +++ b/hw/display/qxl.h
 | ||||||
|  | @@ -147,6 +147,25 @@ OBJECT_DECLARE_SIMPLE_TYPE(PCIQXLDevice, PCI_QXL)
 | ||||||
|  |  #define QXL_DEFAULT_REVISION (QXL_REVISION_STABLE_V12 + 1) | ||||||
|  |   | ||||||
|  |  /* qxl.c */ | ||||||
|  | +/**
 | ||||||
|  | + * qxl_phys2virt: Get a pointer within a PCI VRAM memory region.
 | ||||||
|  | + *
 | ||||||
|  | + * @qxl: QXL device
 | ||||||
|  | + * @phys: physical offset of buffer within the VRAM
 | ||||||
|  | + * @group_id: memory slot group
 | ||||||
|  | + *
 | ||||||
|  | + * Returns a host pointer to a buffer placed at offset @phys within the
 | ||||||
|  | + * active slot @group_id of the PCI VGA RAM memory region associated with
 | ||||||
|  | + * the @qxl device. If the slot is inactive, or the offset is out
 | ||||||
|  | + * of the memory region, returns NULL.
 | ||||||
|  | + *
 | ||||||
|  | + * Use with care; by the time this function returns, the returned pointer is
 | ||||||
|  | + * not protected by RCU anymore.  If the caller is not within an RCU critical
 | ||||||
|  | + * section and does not hold the iothread lock, it must have other means of
 | ||||||
|  | + * protecting the pointer, such as a reference to the region that includes
 | ||||||
|  | + * the incoming ram_addr_t.
 | ||||||
|  | + *
 | ||||||
|  | + */
 | ||||||
|  |  void *qxl_phys2virt(PCIQXLDevice *qxl, QXLPHYSICAL phys, int group_id); | ||||||
|  |  void qxl_set_guest_bug(PCIQXLDevice *qxl, const char *msg, ...) | ||||||
|  |      GCC_FMT_ATTR(2, 3); | ||||||
|  | -- 
 | ||||||
|  | 2.37.3 | ||||||
|  | 
 | ||||||
| @ -0,0 +1,74 @@ | |||||||
|  | From d5a0396f7b836603a409ab265798de010694815b Mon Sep 17 00:00:00 2001 | ||||||
|  | From: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | Date: Mon, 5 Dec 2022 15:32:55 -0500 | ||||||
|  | Subject: [PATCH 2/6] hw/display/qxl: Have qxl_log_command Return early if no | ||||||
|  |  log_cmd handler | ||||||
|  | MIME-Version: 1.0 | ||||||
|  | Content-Type: text/plain; charset=UTF-8 | ||||||
|  | Content-Transfer-Encoding: 8bit | ||||||
|  | 
 | ||||||
|  | RH-Author: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | RH-MergeRequest: 242: hw/display/qxl: Have qxl_log_command Return early if no log_cmd handler | ||||||
|  | RH-Bugzilla: 2152085 | ||||||
|  | RH-Acked-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  | RH-Acked-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  | RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  | RH-Commit: [1/5] 1016976223d919605be9b0ae8a5a71613d9fc19b (jmaloy/jons-qemu-kvm) | ||||||
|  | 
 | ||||||
|  | BZ: https://bugzilla.redhat.com/show_bug.cgi?id=2152085 | ||||||
|  | CVE: CVE-2022-4144 | ||||||
|  | Upstream: Merged | ||||||
|  | 
 | ||||||
|  | commit 61c34fc194b776ecadc39fb26b061331107e5599 | ||||||
|  | Author: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  | Date:   Mon Nov 28 21:27:37 2022 +0100 | ||||||
|  | 
 | ||||||
|  |     hw/display/qxl: Have qxl_log_command Return early if no log_cmd handler | ||||||
|  | 
 | ||||||
|  |     Only 3 command types are logged: no need to call qxl_phys2virt() | ||||||
|  |     for the other types. Using different cases will help to pass | ||||||
|  |     different structure sizes to qxl_phys2virt() in a pair of commits. | ||||||
|  | 
 | ||||||
|  |     Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  |     Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  |     Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  |     Message-Id: <20221128202741.4945-2-philmd@linaro.org> | ||||||
|  | 
 | ||||||
|  | (cherry picked from commit 61c34fc194b776ecadc39fb26b061331107e5599) | ||||||
|  | Signed-off-by: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | ---
 | ||||||
|  |  hw/display/qxl-logger.c | 11 +++++++++++ | ||||||
|  |  1 file changed, 11 insertions(+) | ||||||
|  | 
 | ||||||
|  | diff --git a/hw/display/qxl-logger.c b/hw/display/qxl-logger.c
 | ||||||
|  | index 68bfa47568..1bcf803db6 100644
 | ||||||
|  | --- a/hw/display/qxl-logger.c
 | ||||||
|  | +++ b/hw/display/qxl-logger.c
 | ||||||
|  | @@ -247,6 +247,16 @@ int qxl_log_command(PCIQXLDevice *qxl, const char *ring, QXLCommandExt *ext)
 | ||||||
|  |              qxl_name(qxl_type, ext->cmd.type), | ||||||
|  |              compat ? "(compat)" : ""); | ||||||
|  |   | ||||||
|  | +    switch (ext->cmd.type) {
 | ||||||
|  | +    case QXL_CMD_DRAW:
 | ||||||
|  | +        break;
 | ||||||
|  | +    case QXL_CMD_SURFACE:
 | ||||||
|  | +        break;
 | ||||||
|  | +    case QXL_CMD_CURSOR:
 | ||||||
|  | +        break;
 | ||||||
|  | +    default:
 | ||||||
|  | +        goto out;
 | ||||||
|  | +    }
 | ||||||
|  |      data = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id); | ||||||
|  |      if (!data) { | ||||||
|  |          return 1; | ||||||
|  | @@ -269,6 +279,7 @@ int qxl_log_command(PCIQXLDevice *qxl, const char *ring, QXLCommandExt *ext)
 | ||||||
|  |          qxl_log_cmd_cursor(qxl, data, ext->group_id); | ||||||
|  |          break; | ||||||
|  |      } | ||||||
|  | +out:
 | ||||||
|  |      fprintf(stderr, "\n"); | ||||||
|  |      return 0; | ||||||
|  |  } | ||||||
|  | -- 
 | ||||||
|  | 2.37.3 | ||||||
|  | 
 | ||||||
| @ -0,0 +1,234 @@ | |||||||
|  | From ac90823eccd05943a2ece5f7a8a9892d0c44e2a7 Mon Sep 17 00:00:00 2001 | ||||||
|  | From: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | Date: Mon, 5 Dec 2022 15:32:55 -0500 | ||||||
|  | Subject: [PATCH 4/6] hw/display/qxl: Pass requested buffer size to | ||||||
|  |  qxl_phys2virt() | ||||||
|  | MIME-Version: 1.0 | ||||||
|  | Content-Type: text/plain; charset=UTF-8 | ||||||
|  | Content-Transfer-Encoding: 8bit | ||||||
|  | 
 | ||||||
|  | RH-Author: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | RH-MergeRequest: 242: hw/display/qxl: Have qxl_log_command Return early if no log_cmd handler | ||||||
|  | RH-Bugzilla: 2152085 | ||||||
|  | RH-Acked-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  | RH-Acked-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  | RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  | RH-Commit: [3/5] 89de533fc1f5cc142cfa0ffd213d8683d009ac54 (jmaloy/jons-qemu-kvm) | ||||||
|  | 
 | ||||||
|  | BZ: https://bugzilla.redhat.com/show_bug.cgi?id=2152085 | ||||||
|  | CVE: CVE-2022-4144 | ||||||
|  | Upstream: Merged | ||||||
|  | 
 | ||||||
|  | commit 8efec0ef8bbc1e75a7ebf6e325a35806ece9b39f | ||||||
|  | Author: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  | Date:   Mon Nov 28 21:27:39 2022 +0100 | ||||||
|  | 
 | ||||||
|  |     hw/display/qxl: Pass requested buffer size to qxl_phys2virt() | ||||||
|  | 
 | ||||||
|  |     Currently qxl_phys2virt() doesn't check for buffer overrun. | ||||||
|  |     In order to do so in the next commit, pass the buffer size | ||||||
|  |     as argument. | ||||||
|  | 
 | ||||||
|  |     For QXLCursor in qxl_render_cursor() -> qxl_cursor() we | ||||||
|  |     verify the size of the chunked data ahead, checking we can | ||||||
|  |     access 'sizeof(QXLCursor) + chunk->data_size' bytes. | ||||||
|  |     Since in the SPICE_CURSOR_TYPE_MONO case the cursor is | ||||||
|  |     assumed to fit in one chunk, no change are required. | ||||||
|  |     In SPICE_CURSOR_TYPE_ALPHA the ahead read is handled in | ||||||
|  |     qxl_unpack_chunks(). | ||||||
|  | 
 | ||||||
|  |     Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||||||
|  |     Acked-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  |     Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||||||
|  |     Message-Id: <20221128202741.4945-4-philmd@linaro.org> | ||||||
|  | 
 | ||||||
|  | (cherry picked from commit 8efec0ef8bbc1e75a7ebf6e325a35806ece9b39f) | ||||||
|  | Signed-off-by: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | ---
 | ||||||
|  |  hw/display/qxl-logger.c | 11 ++++++++--- | ||||||
|  |  hw/display/qxl-render.c | 20 ++++++++++++++++---- | ||||||
|  |  hw/display/qxl.c        | 14 +++++++++----- | ||||||
|  |  hw/display/qxl.h        |  4 +++- | ||||||
|  |  4 files changed, 36 insertions(+), 13 deletions(-) | ||||||
|  | 
 | ||||||
|  | diff --git a/hw/display/qxl-logger.c b/hw/display/qxl-logger.c
 | ||||||
|  | index 1bcf803db6..35c38f6252 100644
 | ||||||
|  | --- a/hw/display/qxl-logger.c
 | ||||||
|  | +++ b/hw/display/qxl-logger.c
 | ||||||
|  | @@ -106,7 +106,7 @@ static int qxl_log_image(PCIQXLDevice *qxl, QXLPHYSICAL addr, int group_id)
 | ||||||
|  |      QXLImage *image; | ||||||
|  |      QXLImageDescriptor *desc; | ||||||
|  |   | ||||||
|  | -    image = qxl_phys2virt(qxl, addr, group_id);
 | ||||||
|  | +    image = qxl_phys2virt(qxl, addr, group_id, sizeof(QXLImage));
 | ||||||
|  |      if (!image) { | ||||||
|  |          return 1; | ||||||
|  |      } | ||||||
|  | @@ -214,7 +214,8 @@ int qxl_log_cmd_cursor(PCIQXLDevice *qxl, QXLCursorCmd *cmd, int group_id)
 | ||||||
|  |                  cmd->u.set.position.y, | ||||||
|  |                  cmd->u.set.visible ? "yes" : "no", | ||||||
|  |                  cmd->u.set.shape); | ||||||
|  | -        cursor = qxl_phys2virt(qxl, cmd->u.set.shape, group_id);
 | ||||||
|  | +        cursor = qxl_phys2virt(qxl, cmd->u.set.shape, group_id,
 | ||||||
|  | +                               sizeof(QXLCursor));
 | ||||||
|  |          if (!cursor) { | ||||||
|  |              return 1; | ||||||
|  |          } | ||||||
|  | @@ -236,6 +237,7 @@ int qxl_log_command(PCIQXLDevice *qxl, const char *ring, QXLCommandExt *ext)
 | ||||||
|  |  { | ||||||
|  |      bool compat = ext->flags & QXL_COMMAND_FLAG_COMPAT; | ||||||
|  |      void *data; | ||||||
|  | +    size_t datasz;
 | ||||||
|  |      int ret; | ||||||
|  |   | ||||||
|  |      if (!qxl->cmdlog) { | ||||||
|  | @@ -249,15 +251,18 @@ int qxl_log_command(PCIQXLDevice *qxl, const char *ring, QXLCommandExt *ext)
 | ||||||
|  |   | ||||||
|  |      switch (ext->cmd.type) { | ||||||
|  |      case QXL_CMD_DRAW: | ||||||
|  | +        datasz = compat ? sizeof(QXLCompatDrawable) : sizeof(QXLDrawable);
 | ||||||
|  |          break; | ||||||
|  |      case QXL_CMD_SURFACE: | ||||||
|  | +        datasz = sizeof(QXLSurfaceCmd);
 | ||||||
|  |          break; | ||||||
|  |      case QXL_CMD_CURSOR: | ||||||
|  | +        datasz = sizeof(QXLCursorCmd);
 | ||||||
|  |          break; | ||||||
|  |      default: | ||||||
|  |          goto out; | ||||||
|  |      } | ||||||
|  | -    data = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id);
 | ||||||
|  | +    data = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id, datasz);
 | ||||||
|  |      if (!data) { | ||||||
|  |          return 1; | ||||||
|  |      } | ||||||
|  | diff --git a/hw/display/qxl-render.c b/hw/display/qxl-render.c
 | ||||||
|  | index ca217004bf..fcfd40c3ac 100644
 | ||||||
|  | --- a/hw/display/qxl-render.c
 | ||||||
|  | +++ b/hw/display/qxl-render.c
 | ||||||
|  | @@ -107,7 +107,9 @@ static void qxl_render_update_area_unlocked(PCIQXLDevice *qxl)
 | ||||||
|  |          qxl->guest_primary.resized = 0; | ||||||
|  |          qxl->guest_primary.data = qxl_phys2virt(qxl, | ||||||
|  |                                                  qxl->guest_primary.surface.mem, | ||||||
|  | -                                                MEMSLOT_GROUP_GUEST);
 | ||||||
|  | +                                                MEMSLOT_GROUP_GUEST,
 | ||||||
|  | +                                                qxl->guest_primary.abs_stride
 | ||||||
|  | +                                                * height);
 | ||||||
|  |          if (!qxl->guest_primary.data) { | ||||||
|  |              goto end; | ||||||
|  |          } | ||||||
|  | @@ -228,7 +230,8 @@ static void qxl_unpack_chunks(void *dest, size_t size, PCIQXLDevice *qxl,
 | ||||||
|  |          if (offset == size) { | ||||||
|  |              return; | ||||||
|  |          } | ||||||
|  | -        chunk = qxl_phys2virt(qxl, chunk->next_chunk, group_id);
 | ||||||
|  | +        chunk = qxl_phys2virt(qxl, chunk->next_chunk, group_id,
 | ||||||
|  | +                              sizeof(QXLDataChunk) + chunk->data_size);
 | ||||||
|  |          if (!chunk) { | ||||||
|  |              return; | ||||||
|  |          } | ||||||
|  | @@ -295,7 +298,8 @@ fail:
 | ||||||
|  |  /* called from spice server thread context only */ | ||||||
|  |  int qxl_render_cursor(PCIQXLDevice *qxl, QXLCommandExt *ext) | ||||||
|  |  { | ||||||
|  | -    QXLCursorCmd *cmd = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id);
 | ||||||
|  | +    QXLCursorCmd *cmd = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id,
 | ||||||
|  | +                                      sizeof(QXLCursorCmd));
 | ||||||
|  |      QXLCursor *cursor; | ||||||
|  |      QEMUCursor *c; | ||||||
|  |   | ||||||
|  | @@ -314,7 +318,15 @@ int qxl_render_cursor(PCIQXLDevice *qxl, QXLCommandExt *ext)
 | ||||||
|  |      } | ||||||
|  |      switch (cmd->type) { | ||||||
|  |      case QXL_CURSOR_SET: | ||||||
|  | -        cursor = qxl_phys2virt(qxl, cmd->u.set.shape, ext->group_id);
 | ||||||
|  | +        /* First read the QXLCursor to get QXLDataChunk::data_size ... */
 | ||||||
|  | +        cursor = qxl_phys2virt(qxl, cmd->u.set.shape, ext->group_id,
 | ||||||
|  | +                               sizeof(QXLCursor));
 | ||||||
|  | +        if (!cursor) {
 | ||||||
|  | +            return 1;
 | ||||||
|  | +        }
 | ||||||
|  | +        /* Then read including the chunked data following QXLCursor. */
 | ||||||
|  | +        cursor = qxl_phys2virt(qxl, cmd->u.set.shape, ext->group_id,
 | ||||||
|  | +                               sizeof(QXLCursor) + cursor->chunk.data_size);
 | ||||||
|  |          if (!cursor) { | ||||||
|  |              return 1; | ||||||
|  |          } | ||||||
|  | diff --git a/hw/display/qxl.c b/hw/display/qxl.c
 | ||||||
|  | index 29c80b4289..aa9065183e 100644
 | ||||||
|  | --- a/hw/display/qxl.c
 | ||||||
|  | +++ b/hw/display/qxl.c
 | ||||||
|  | @@ -274,7 +274,8 @@ static void qxl_spice_monitors_config_async(PCIQXLDevice *qxl, int replay)
 | ||||||
|  |                                            QXL_IO_MONITORS_CONFIG_ASYNC)); | ||||||
|  |      } | ||||||
|  |   | ||||||
|  | -    cfg = qxl_phys2virt(qxl, qxl->guest_monitors_config, MEMSLOT_GROUP_GUEST);
 | ||||||
|  | +    cfg = qxl_phys2virt(qxl, qxl->guest_monitors_config, MEMSLOT_GROUP_GUEST,
 | ||||||
|  | +                        sizeof(QXLMonitorsConfig));
 | ||||||
|  |      if (cfg != NULL && cfg->count == 1) { | ||||||
|  |          qxl->guest_primary.resized = 1; | ||||||
|  |          qxl->guest_head0_width  = cfg->heads[0].width; | ||||||
|  | @@ -459,7 +460,8 @@ static int qxl_track_command(PCIQXLDevice *qxl, struct QXLCommandExt *ext)
 | ||||||
|  |      switch (le32_to_cpu(ext->cmd.type)) { | ||||||
|  |      case QXL_CMD_SURFACE: | ||||||
|  |      { | ||||||
|  | -        QXLSurfaceCmd *cmd = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id);
 | ||||||
|  | +        QXLSurfaceCmd *cmd = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id,
 | ||||||
|  | +                                           sizeof(QXLSurfaceCmd));
 | ||||||
|  |   | ||||||
|  |          if (!cmd) { | ||||||
|  |              return 1; | ||||||
|  | @@ -494,7 +496,8 @@ static int qxl_track_command(PCIQXLDevice *qxl, struct QXLCommandExt *ext)
 | ||||||
|  |      } | ||||||
|  |      case QXL_CMD_CURSOR: | ||||||
|  |      { | ||||||
|  | -        QXLCursorCmd *cmd = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id);
 | ||||||
|  | +        QXLCursorCmd *cmd = qxl_phys2virt(qxl, ext->cmd.data, ext->group_id,
 | ||||||
|  | +                                          sizeof(QXLCursorCmd));
 | ||||||
|  |   | ||||||
|  |          if (!cmd) { | ||||||
|  |              return 1; | ||||||
|  | @@ -1444,7 +1447,8 @@ static bool qxl_get_check_slot_offset(PCIQXLDevice *qxl, QXLPHYSICAL pqxl,
 | ||||||
|  |  } | ||||||
|  |   | ||||||
|  |  /* can be also called from spice server thread context */ | ||||||
|  | -void *qxl_phys2virt(PCIQXLDevice *qxl, QXLPHYSICAL pqxl, int group_id)
 | ||||||
|  | +void *qxl_phys2virt(PCIQXLDevice *qxl, QXLPHYSICAL pqxl, int group_id,
 | ||||||
|  | +                    size_t size)
 | ||||||
|  |  { | ||||||
|  |      uint64_t offset; | ||||||
|  |      uint32_t slot; | ||||||
|  | @@ -1952,7 +1956,7 @@ static void qxl_dirty_surfaces(PCIQXLDevice *qxl)
 | ||||||
|  |          } | ||||||
|  |   | ||||||
|  |          cmd = qxl_phys2virt(qxl, qxl->guest_surfaces.cmds[i], | ||||||
|  | -                            MEMSLOT_GROUP_GUEST);
 | ||||||
|  | +                            MEMSLOT_GROUP_GUEST, sizeof(QXLSurfaceCmd));
 | ||||||
|  |          assert(cmd); | ||||||
|  |          assert(cmd->type == QXL_SURFACE_CMD_CREATE); | ||||||
|  |          qxl_dirty_one_surface(qxl, cmd->u.surface_create.data, | ||||||
|  | diff --git a/hw/display/qxl.h b/hw/display/qxl.h
 | ||||||
|  | index c938f88a2f..c784315daa 100644
 | ||||||
|  | --- a/hw/display/qxl.h
 | ||||||
|  | +++ b/hw/display/qxl.h
 | ||||||
|  | @@ -153,6 +153,7 @@ OBJECT_DECLARE_SIMPLE_TYPE(PCIQXLDevice, PCI_QXL)
 | ||||||
|  |   * @qxl: QXL device | ||||||
|  |   * @phys: physical offset of buffer within the VRAM | ||||||
|  |   * @group_id: memory slot group | ||||||
|  | + * @size: size of the buffer
 | ||||||
|  |   * | ||||||
|  |   * Returns a host pointer to a buffer placed at offset @phys within the | ||||||
|  |   * active slot @group_id of the PCI VGA RAM memory region associated with | ||||||
|  | @@ -166,7 +167,8 @@ OBJECT_DECLARE_SIMPLE_TYPE(PCIQXLDevice, PCI_QXL)
 | ||||||
|  |   * the incoming ram_addr_t. | ||||||
|  |   * | ||||||
|  |   */ | ||||||
|  | -void *qxl_phys2virt(PCIQXLDevice *qxl, QXLPHYSICAL phys, int group_id);
 | ||||||
|  | +void *qxl_phys2virt(PCIQXLDevice *qxl, QXLPHYSICAL phys, int group_id,
 | ||||||
|  | +                    size_t size);
 | ||||||
|  |  void qxl_set_guest_bug(PCIQXLDevice *qxl, const char *msg, ...) | ||||||
|  |      GCC_FMT_ATTR(2, 3); | ||||||
|  |   | ||||||
|  | -- 
 | ||||||
|  | 2.37.3 | ||||||
|  | 
 | ||||||
							
								
								
									
										90
									
								
								SOURCES/kvm-ui-vnc.c-Fixed-a-deadlock-bug.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										90
									
								
								SOURCES/kvm-ui-vnc.c-Fixed-a-deadlock-bug.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,90 @@ | |||||||
|  | From 05630592885c6c82ba83e197626e773b0d93d608 Mon Sep 17 00:00:00 2001 | ||||||
|  | From: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | Date: Fri, 18 Nov 2022 20:26:54 -0500 | ||||||
|  | Subject: [PATCH 1/6] ui/vnc.c: Fixed a deadlock bug. | ||||||
|  | MIME-Version: 1.0 | ||||||
|  | Content-Type: text/plain; charset=UTF-8 | ||||||
|  | Content-Transfer-Encoding: 8bit | ||||||
|  | 
 | ||||||
|  | RH-Author: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | RH-MergeRequest: 237: ui/vnc.c: Fixed a deadlock bug. | ||||||
|  | RH-Bugzilla: 2148504 | ||||||
|  | RH-Acked-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  | RH-Acked-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  | RH-Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com> | ||||||
|  | RH-Commit: [1/1] 0be7fc3eaa5b41e806adaf75750fee75bb33a92f (jmaloy/jons-qemu-kvm) | ||||||
|  | 
 | ||||||
|  | BZ: https://bugzilla.redhat.com/show_bug.cgi?id=2148504 | ||||||
|  | Upstream: Merged | ||||||
|  | 
 | ||||||
|  | commit 1dbbe6f172810026c51dc84ed927a3cc23017949 | ||||||
|  | Author: Rao Lei <lei.rao@intel.com> | ||||||
|  | Date:   Wed Jan 5 10:08:08 2022 +0800 | ||||||
|  | 
 | ||||||
|  |     ui/vnc.c: Fixed a deadlock bug. | ||||||
|  | 
 | ||||||
|  |     The GDB statck is as follows: | ||||||
|  |     (gdb) bt | ||||||
|  |     0  __lll_lock_wait (futex=futex@entry=0x56211df20360, private=0) at lowlevellock.c:52 | ||||||
|  |     1  0x00007f263caf20a3 in __GI___pthread_mutex_lock (mutex=0x56211df20360) at ../nptl/pthread_mutex_lock.c:80 | ||||||
|  |     2  0x000056211a757364 in qemu_mutex_lock_impl (mutex=0x56211df20360, file=0x56211a804857 "../ui/vnc-jobs.h", line=60) | ||||||
|  |         at ../util/qemu-thread-posix.c:80 | ||||||
|  |     3  0x000056211a0ef8c7 in vnc_lock_output (vs=0x56211df14200) at ../ui/vnc-jobs.h:60 | ||||||
|  |     4  0x000056211a0efcb7 in vnc_clipboard_send (vs=0x56211df14200, count=1, dwords=0x7ffdf1701338) at ../ui/vnc-clipboard.c:138 | ||||||
|  |     5  0x000056211a0f0129 in vnc_clipboard_notify (notifier=0x56211df244c8, data=0x56211dd1bbf0) at ../ui/vnc-clipboard.c:209 | ||||||
|  |     6  0x000056211a75dde8 in notifier_list_notify (list=0x56211afa17d0 <clipboard_notifiers>, data=0x56211dd1bbf0) at ../util/notify.c:39 | ||||||
|  |     7  0x000056211a0bf0e6 in qemu_clipboard_update (info=0x56211dd1bbf0) at ../ui/clipboard.c:50 | ||||||
|  |     8  0x000056211a0bf05d in qemu_clipboard_peer_release (peer=0x56211df244c0, selection=QEMU_CLIPBOARD_SELECTION_CLIPBOARD) | ||||||
|  |         at ../ui/clipboard.c:41 | ||||||
|  |     9  0x000056211a0bef9b in qemu_clipboard_peer_unregister (peer=0x56211df244c0) at ../ui/clipboard.c:19 | ||||||
|  |     10 0x000056211a0d45f3 in vnc_disconnect_finish (vs=0x56211df14200) at ../ui/vnc.c:1358 | ||||||
|  |     11 0x000056211a0d4c9d in vnc_client_read (vs=0x56211df14200) at ../ui/vnc.c:1611 | ||||||
|  |     12 0x000056211a0d4df8 in vnc_client_io (ioc=0x56211ce70690, condition=G_IO_IN, opaque=0x56211df14200) at ../ui/vnc.c:1649 | ||||||
|  |     13 0x000056211a5b976c in qio_channel_fd_source_dispatch | ||||||
|  |         (source=0x56211ce50a00, callback=0x56211a0d4d71 <vnc_client_io>, user_data=0x56211df14200) at ../io/channel-watch.c:84 | ||||||
|  |     14 0x00007f263ccede8e in g_main_context_dispatch () at /lib/x86_64-linux-gnu/libglib-2.0.so.0 | ||||||
|  |     15 0x000056211a77d4a1 in glib_pollfds_poll () at ../util/main-loop.c:232 | ||||||
|  |     16 0x000056211a77d51f in os_host_main_loop_wait (timeout=958545) at ../util/main-loop.c:255 | ||||||
|  |     17 0x000056211a77d630 in main_loop_wait (nonblocking=0) at ../util/main-loop.c:531 | ||||||
|  |     18 0x000056211a45bc8e in qemu_main_loop () at ../softmmu/runstate.c:726 | ||||||
|  |     19 0x000056211a0b45fa in main (argc=69, argv=0x7ffdf1701778, envp=0x7ffdf17019a8) at ../softmmu/main.c:50 | ||||||
|  | 
 | ||||||
|  |     From the call trace, we can see it is a deadlock bug. | ||||||
|  |     vnc_disconnect_finish will acquire the output_mutex. | ||||||
|  |     But, the output_mutex will be acquired again in vnc_clipboard_send. | ||||||
|  |     Repeated locking will cause deadlock. So, I move | ||||||
|  |     qemu_clipboard_peer_unregister() behind vnc_unlock_output(); | ||||||
|  |      Fixes: 0bf41cab93e ("ui/vnc: clipboard support") | ||||||
|  |     Signed-off-by: Lei Rao <lei.rao@intel.com> | ||||||
|  |     Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com> | ||||||
|  |     Message-Id: <20220105020808.597325-1-lei.rao@intel.com> | ||||||
|  |     Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | ||||||
|  | 
 | ||||||
|  | (cherry picked from commit 1dbbe6f172810026c51dc84ed927a3cc23017949) | ||||||
|  | Signed-off-by: Jon Maloy <jmaloy@redhat.com> | ||||||
|  | ---
 | ||||||
|  |  ui/vnc.c | 4 ++-- | ||||||
|  |  1 file changed, 2 insertions(+), 2 deletions(-) | ||||||
|  | 
 | ||||||
|  | diff --git a/ui/vnc.c b/ui/vnc.c
 | ||||||
|  | index af02522e84..b253e85c65 100644
 | ||||||
|  | --- a/ui/vnc.c
 | ||||||
|  | +++ b/ui/vnc.c
 | ||||||
|  | @@ -1354,12 +1354,12 @@ void vnc_disconnect_finish(VncState *vs)
 | ||||||
|  |          /* last client gone */ | ||||||
|  |          vnc_update_server_surface(vs->vd); | ||||||
|  |      } | ||||||
|  | +    vnc_unlock_output(vs);
 | ||||||
|  | +
 | ||||||
|  |      if (vs->cbpeer.update.notify) { | ||||||
|  |          qemu_clipboard_peer_unregister(&vs->cbpeer); | ||||||
|  |      } | ||||||
|  |   | ||||||
|  | -    vnc_unlock_output(vs);
 | ||||||
|  | -
 | ||||||
|  |      qemu_mutex_destroy(&vs->output_mutex); | ||||||
|  |      if (vs->bh != NULL) { | ||||||
|  |          qemu_bh_delete(vs->bh); | ||||||
|  | -- 
 | ||||||
|  | 2.37.3 | ||||||
|  | 
 | ||||||
| @ -83,7 +83,7 @@ Obsoletes: %1-rhev <= %{epoch}:%{version}-%{release} | |||||||
| Summary: QEMU is a machine emulator and virtualizer | Summary: QEMU is a machine emulator and virtualizer | ||||||
| Name: qemu-kvm | Name: qemu-kvm | ||||||
| Version: 6.2.0 | Version: 6.2.0 | ||||||
| Release: 20%{?rcrel}%{?dist}.2 | Release: 21%{?rcrel}%{?dist}.2 | ||||||
| # Epoch because we pushed a qemu-1.0 package. AIUI this can't ever be dropped | # Epoch because we pushed a qemu-1.0 package. AIUI this can't ever be dropped | ||||||
| Epoch: 15 | Epoch: 15 | ||||||
| License: GPLv2 and GPLv2+ and CC-BY | License: GPLv2 and GPLv2+ and CC-BY | ||||||
| @ -433,6 +433,18 @@ Patch166: kvm-i386-reset-KVM-nested-state-upon-CPU-reset.patch | |||||||
| Patch167: kvm-i386-do-kvm_put_msr_feature_control-first-thing-when.patch | Patch167: kvm-i386-do-kvm_put_msr_feature_control-first-thing-when.patch | ||||||
| # For bz#2132391 - [virtiofs] virtiofsd debug log's timestamp is NULL [rhel-8.7.0.z] | # For bz#2132391 - [virtiofs] virtiofsd debug log's timestamp is NULL [rhel-8.7.0.z] | ||||||
| Patch168: kvm-virtiofsd-use-g_date_time_get_microsecond-to-get-sub.patch | Patch168: kvm-virtiofsd-use-g_date_time_get_microsecond-to-get-sub.patch | ||||||
|  | # For bz#2148504 - VMs hung on vnc_clipboard_send [rhel-8.7.0.z] | ||||||
|  | Patch169: kvm-ui-vnc.c-Fixed-a-deadlock-bug.patch | ||||||
|  | # For bz#2152085 - CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8] [rhel-8.7.0.z] | ||||||
|  | Patch170: kvm-hw-display-qxl-Have-qxl_log_command-Return-early-if-.patch | ||||||
|  | # For bz#2152085 - CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8] [rhel-8.7.0.z] | ||||||
|  | Patch171: kvm-hw-display-qxl-Document-qxl_phys2virt.patch | ||||||
|  | # For bz#2152085 - CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8] [rhel-8.7.0.z] | ||||||
|  | Patch172: kvm-hw-display-qxl-Pass-requested-buffer-size-to-qxl_phy.patch | ||||||
|  | # For bz#2152085 - CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8] [rhel-8.7.0.z] | ||||||
|  | Patch173: kvm-hw-display-qxl-Avoid-buffer-overrun-in-qxl_phys2virt.patch | ||||||
|  | # For bz#2152085 - CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8] [rhel-8.7.0.z] | ||||||
|  | Patch174: kvm-hw-display-qxl-Assert-memory-slot-fits-in-preallocat.patch | ||||||
| 
 | 
 | ||||||
| BuildRequires: wget | BuildRequires: wget | ||||||
| BuildRequires: rpm-build | BuildRequires: rpm-build | ||||||
| @ -1602,6 +1614,18 @@ sh %{_sysconfdir}/sysconfig/modules/kvm.modules &> /dev/null || : | |||||||
| 
 | 
 | ||||||
| 
 | 
 | ||||||
| %changelog | %changelog | ||||||
|  | * Thu Dec 15 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-21.el8_7.2 | ||||||
|  | - kvm-ui-vnc.c-Fixed-a-deadlock-bug.patch [bz#2148504] | ||||||
|  | - kvm-hw-display-qxl-Have-qxl_log_command-Return-early-if-.patch [bz#2152085] | ||||||
|  | - kvm-hw-display-qxl-Document-qxl_phys2virt.patch [bz#2152085] | ||||||
|  | - kvm-hw-display-qxl-Pass-requested-buffer-size-to-qxl_phy.patch [bz#2152085] | ||||||
|  | - kvm-hw-display-qxl-Avoid-buffer-overrun-in-qxl_phys2virt.patch [bz#2152085] | ||||||
|  | - kvm-hw-display-qxl-Assert-memory-slot-fits-in-preallocat.patch [bz#2152085] | ||||||
|  | - Resolves: bz#2148504 | ||||||
|  |   (VMs hung on vnc_clipboard_send [rhel-8.7.0.z]) | ||||||
|  | - Resolves: bz#2152085 | ||||||
|  |   (CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8] [rhel-8.7.0.z]) | ||||||
|  | 
 | ||||||
| * Wed Oct 12 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-20.el8_7.2 | * Wed Oct 12 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-20.el8_7.2 | ||||||
| - kvm-virtiofsd-use-g_date_time_get_microsecond-to-get-sub.patch [bz#2132391] | - kvm-virtiofsd-use-g_date_time_get_microsecond-to-get-sub.patch [bz#2132391] | ||||||
| - Resolves: bz#2132391 | - Resolves: bz#2132391 | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user