Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
Package not found: openSUSE:Slowroll:Build:1/korganizer
SUSE:SLE-12-SP1:Update
xen.3680
xsa184.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File xsa184.patch of Package xen.3680
References: bsc#990923 CVE-2016-5403 XSA-184 Subject: virtio: error out if guest exceeds virtqueue size From: Stefan Hajnoczi stefanha@redhat.com Tue Jul 19 13:07:13 2016 +0100 Date: Wed Jul 27 14:04:40 2016 +0100: Git: afd9096eb1882f23929f5b5c177898ed231bac66 A broken or malicious guest can submit more requests than the virtqueue size permits, causing unbounded memory allocation in QEMU. The guest can submit requests without bothering to wait for completion and is therefore not bound by virtqueue size. This requires reusing vring descriptors in more than one request, which is not allowed by the VIRTIO 1.0 specification. In "3.2.1 Supplying Buffers to The Device", the VIRTIO 1.0 specification says: 1. The driver places the buffer into free descriptor(s) in the descriptor table, chaining as necessary and Note that the above code does not take precautions against the available ring buffer wrapping around: this is not possible since the ring buffer is the same size as the descriptor table, so step (1) will prevent such a condition. This implies that placing more buffers into the virtqueue than the descriptor table size is not allowed. QEMU is missing the check to prevent this case. Processing a request allocates a VirtQueueElement leading to unbounded memory allocation controlled by the guest. Exit with an error if the guest provides more requests than the virtqueue size permits. This bounds memory allocation and makes the buggy guest visible to the user. This patch fixes CVE-2016-5403 and was reported by Zhenhao Hong from 360 Marvel Team, China. Reported-by: Zhenhao Hong <hongzhenhao@360.cn> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> Index: xen-4.4.4-testing/tools/qemu-xen-dir-remote/hw/virtio/virtio.c =================================================================== --- xen-4.4.4-testing.orig/tools/qemu-xen-dir-remote/hw/virtio/virtio.c +++ xen-4.4.4-testing/tools/qemu-xen-dir-remote/hw/virtio/virtio.c @@ -456,6 +456,11 @@ int virtqueue_pop(VirtQueue *vq, VirtQue max = vq->vring.num; + if (vq->inuse >= vq->vring.num) { + error_report("Virtqueue size exceeded"); + exit(1); + } + i = head = virtqueue_get_head(vq, vq->last_avail_idx++); if (vq->vdev->guest_features & (1 << VIRTIO_RING_F_EVENT_IDX)) { vring_avail_event(vq, vring_avail_idx(vq));
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor