Blame SOURCES/kvm-block-cloop-validate-block_size-header-field-CVE-201.patch

0a122b
From ba8c0cc73f3a13b5621c8fe44eb8af20ddb9c5d0 Mon Sep 17 00:00:00 2001
0a122b
From: Stefan Hajnoczi <stefanha@redhat.com>
0a122b
Date: Tue, 25 Mar 2014 14:23:11 +0100
0a122b
Subject: [PATCH 04/49] block/cloop: validate block_size header field (CVE-2014-0144)
0a122b
0a122b
RH-Author: Kevin Wolf <kwolf@redhat.com>
0a122b
Message-id: <1395753835-7591-5-git-send-email-kwolf@redhat.com>
0a122b
Patchwork-id: n/a
0a122b
O-Subject: [virt-devel] [EMBARGOED RHEL-7.0 qemu-kvm PATCH 04/48] block/cloop: validate block_size header field (CVE-2014-0144)
0a122b
Bugzilla: 1079455
0a122b
RH-Acked-by: Jeff Cody <jcody@redhat.com>
0a122b
RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
0a122b
RH-Acked-by: Paolo Bonzini <pbonzini@redhat.com>
0a122b
0a122b
From: Stefan Hajnoczi <stefanha@redhat.com>
0a122b
0a122b
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1079455
0a122b
Upstream status: Embargoed
0a122b
0a122b
Avoid unbounded s->uncompressed_block memory allocation by checking that
0a122b
the block_size header field has a reasonable value. Also enforce the
0a122b
assumption that the value is a non-zero multiple of 512.
0a122b
0a122b
These constraints conform to cloop 2.639's code so we accept existing
0a122b
image files.
0a122b
0a122b
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
0a122b
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
0a122b
---
0a122b
 block/cloop.c              |   23 +++++++++++++++++++++++
0a122b
 tests/qemu-iotests/075     |   20 ++++++++++++++++++++
0a122b
 tests/qemu-iotests/075.out |   12 ++++++++++++
0a122b
 3 files changed, 55 insertions(+), 0 deletions(-)
0a122b
0a122b
diff --git a/block/cloop.c b/block/cloop.c
0a122b
index b907023..f021663 100644
0a122b
--- a/block/cloop.c
0a122b
+++ b/block/cloop.c
0a122b
@@ -26,6 +26,9 @@
0a122b
 #include "qemu/module.h"
0a122b
 #include <zlib.h>
0a122b
 
0a122b
+/* Maximum compressed block size */
0a122b
+#define MAX_BLOCK_SIZE (64 * 1024 * 1024)
0a122b
+
0a122b
 typedef struct BDRVCloopState {
0a122b
     CoMutex lock;
0a122b
     uint32_t block_size;
0a122b
@@ -68,6 +71,26 @@ static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
0a122b
         return ret;
0a122b
     }
0a122b
     s->block_size = be32_to_cpu(s->block_size);
0a122b
+    if (s->block_size % 512) {
0a122b
+        error_setg(errp, "block_size %u must be a multiple of 512",
0a122b
+                   s->block_size);
0a122b
+        return -EINVAL;
0a122b
+    }
0a122b
+    if (s->block_size == 0) {
0a122b
+        error_setg(errp, "block_size cannot be zero");
0a122b
+        return -EINVAL;
0a122b
+    }
0a122b
+
0a122b
+    /* cloop's create_compressed_fs.c warns about block sizes beyond 256 KB but
0a122b
+     * we can accept more.  Prevent ridiculous values like 4 GB - 1 since we
0a122b
+     * need a buffer this big.
0a122b
+     */
0a122b
+    if (s->block_size > MAX_BLOCK_SIZE) {
0a122b
+        error_setg(errp, "block_size %u must be %u MB or less",
0a122b
+                   s->block_size,
0a122b
+                   MAX_BLOCK_SIZE / (1024 * 1024));
0a122b
+        return -EINVAL;
0a122b
+    }
0a122b
 
0a122b
     ret = bdrv_pread(bs->file, 128 + 4, &s->n_blocks, 4);
0a122b
     if (ret < 0) {
0a122b
diff --git a/tests/qemu-iotests/075 b/tests/qemu-iotests/075
0a122b
index 88ae8bb..8f54a99 100755
0a122b
--- a/tests/qemu-iotests/075
0a122b
+++ b/tests/qemu-iotests/075
0a122b
@@ -42,11 +42,31 @@ _supported_fmt cloop
0a122b
 _supported_proto generic
0a122b
 _supported_os Linux
0a122b
 
0a122b
+block_size_offset=128
0a122b
+
0a122b
 echo
0a122b
 echo "== check that the first sector can be read =="
0a122b
 _use_sample_img simple-pattern.cloop.bz2
0a122b
 $QEMU_IO -c "read 0 512" $TEST_IMG 2>&1 | _filter_qemu_io | _filter_testdir
0a122b
 
0a122b
+echo
0a122b
+echo "== block_size must be a multiple of 512 =="
0a122b
+_use_sample_img simple-pattern.cloop.bz2
0a122b
+poke_file "$TEST_IMG" "$block_size_offset" "\x00\x00\x02\x01"
0a122b
+$QEMU_IO -c "read 0 512" $TEST_IMG 2>&1 | _filter_qemu_io | _filter_testdir
0a122b
+
0a122b
+echo
0a122b
+echo "== block_size cannot be zero =="
0a122b
+_use_sample_img simple-pattern.cloop.bz2
0a122b
+poke_file "$TEST_IMG" "$block_size_offset" "\x00\x00\x00\x00"
0a122b
+$QEMU_IO -c "read 0 512" $TEST_IMG 2>&1 | _filter_qemu_io | _filter_testdir
0a122b
+
0a122b
+echo
0a122b
+echo "== huge block_size ==="
0a122b
+_use_sample_img simple-pattern.cloop.bz2
0a122b
+poke_file "$TEST_IMG" "$block_size_offset" "\xff\xff\xfe\x00"
0a122b
+$QEMU_IO -c "read 0 512" $TEST_IMG 2>&1 | _filter_qemu_io | _filter_testdir
0a122b
+
0a122b
 # success, all done
0a122b
 echo "*** done"
0a122b
 rm -f $seq.full
0a122b
diff --git a/tests/qemu-iotests/075.out b/tests/qemu-iotests/075.out
0a122b
index 26661fa..d362c95 100644
0a122b
--- a/tests/qemu-iotests/075.out
0a122b
+++ b/tests/qemu-iotests/075.out
0a122b
@@ -3,4 +3,16 @@ QA output created by 075
0a122b
 == check that the first sector can be read ==
0a122b
 read 512/512 bytes at offset 0
0a122b
 512 bytes, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
0a122b
+
0a122b
+== block_size must be a multiple of 512 ==
0a122b
+qemu-io: can't open device TEST_DIR/simple-pattern.cloop: block_size 513 must be a multiple of 512
0a122b
+no file open, try 'help open'
0a122b
+
0a122b
+== block_size cannot be zero ==
0a122b
+qemu-io: can't open device TEST_DIR/simple-pattern.cloop: block_size cannot be zero
0a122b
+no file open, try 'help open'
0a122b
+
0a122b
+== huge block_size ===
0a122b
+qemu-io: can't open device TEST_DIR/simple-pattern.cloop: block_size 4294966784 must be 64 MB or less
0a122b
+no file open, try 'help open'
0a122b
 *** done
0a122b
-- 
0a122b
1.7.1
0a122b