On Wed, 2022-02-23 at 20:01 -0500, Randy MacLeod wrote:
> Anuj,
> 
> Did you miss this one?

A hardknott point release, 3.3.5, is in QA right now so I didn't take
patches this week. It will be in next week's pull request.

I have taken this for honister in the meantime.

Thanks,

Anuj

> I don't see it in:
> https://git.openembedded.org/meta-openembedded-contrib/log/?h=hardknott-next
> 
> ../Randy
> 
> On 2022-02-16 18:12, Joe Slater wrote:
> > CVE-2022-0135 concerns out-of-bounds writes in
> > read_transfer_data().
> > CVE-2022-0175 concerns using malloc() instead of calloc().
> > 
> > We cherry-pick from master.
> > 
> > Signed-off-by: Joe Slater <joe.sla...@windriver.com>
> > Signed-off-by: Richard Purdie <richard.pur...@linuxfoundation.org>
> > (cherry picked from commit
> > 91f7511df79c5c1f93add9f2827a5a266453614e)
> > 
> > Modify -0175 patch to apply to hardknott branch.
> > 
> > Signed-off-by: Joe Slater <joe.sla...@windriver.com>
> > ---
> >   .../virglrenderer/cve-2022-0135.patch         | 117
> > ++++++++++++++++++
> >   .../virglrenderer/cve-2022-0175.patch         | 112
> > +++++++++++++++++
> >   .../virglrenderer/virglrenderer_0.8.2.bb      |   2 +
> >   3 files changed, 231 insertions(+)
> >   create mode 100644 meta/recipes-
> > graphics/virglrenderer/virglrenderer/cve-2022-0135.patch
> >   create mode 100644 meta/recipes-
> > graphics/virglrenderer/virglrenderer/cve-2022-0175.patch
> > 
> > diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer/cve-
> > 2022-0135.patch b/meta/recipes-
> > graphics/virglrenderer/virglrenderer/cve-2022-0135.patch
> > new file mode 100644
> > index 0000000000..ae42dc8f6c
> > --- /dev/null
> > +++ b/meta/recipes-graphics/virglrenderer/virglrenderer/cve-2022-
> > 0135.patch
> > @@ -0,0 +1,117 @@
> > +From 63aee871365f9c9e7fa9125672302a0fb250d34d Mon Sep 17 00:00:00
> > 2001
> > +From: Gert Wollny <gert.wol...@collabora.com>
> > +Date: Tue, 30 Nov 2021 09:16:24 +0100
> > +Subject: [PATCH 2/2] vrend: propperly check whether the shader
> > image range is
> > + correct
> > +
> > +Also add a test to check the integer underflow.
> > +
> > +Closes: #251
> > +Signed-off-by: Gert Wollny <gert.wol...@collabora.com>
> > +Reviewed-by: Chia-I Wu <olva...@gmail.com>
> > +
> > +cherry-pick from anongit.freedesktop.org/virglrenderer
> > +commit 2aed5d4...
> > +
> > +CVE: CVE-2022-0135
> > +Upstream-Status: Backport
> > +Signed-off-by: Joe Slater <joe.sla...@windriver.com>
> > +
> > +---
> > + src/vrend_decode.c          |  3 +-
> > + tests/test_fuzzer_formats.c | 57
> > +++++++++++++++++++++++++++++++++++++
> > + 2 files changed, 59 insertions(+), 1 deletion(-)
> > +
> > +diff --git a/src/vrend_decode.c b/src/vrend_decode.c
> > +index 91f5f24..6771b10 100644
> > +--- a/src/vrend_decode.c
> > ++++ b/src/vrend_decode.c
> > +@@ -1249,8 +1249,9 @@ static int
> > vrend_decode_set_shader_images(struct vrend_context *ctx, const
> > uint3
> > +    if (num_images < 1) {
> > +       return 0;
> > +    }
> > ++
> > +    if (start_slot > PIPE_MAX_SHADER_IMAGES ||
> > +-       start_slot > PIPE_MAX_SHADER_IMAGES - num_images)
> > ++       start_slot + num_images > PIPE_MAX_SHADER_IMAGES)
> > +       return EINVAL;
> > +
> > +    for (uint32_t i = 0; i < num_images; i++) {
> > +diff --git a/tests/test_fuzzer_formats.c
> > b/tests/test_fuzzer_formats.c
> > +index 154a2e5..e32caf0 100644
> > +--- a/tests/test_fuzzer_formats.c
> > ++++ b/tests/test_fuzzer_formats.c
> > +@@ -958,6 +958,61 @@ static void
> > test_vrend_set_signle_abo_heap_overflow() {
> > +     virgl_renderer_submit_cmd((void *) cmd, ctx_id, 0xde);
> > + }
> > +
> > ++static void test_vrend_set_shader_images_overflow()
> > ++{
> > ++    uint32_t num_shaders = PIPE_MAX_SHADER_IMAGES + 1;
> > ++    uint32_t size = num_shaders *
> > VIRGL_SET_SHADER_IMAGE_ELEMENT_SIZE + 3;
> > ++    uint32_t cmd[size];
> > ++    int i = 0;
> > ++    cmd[i++] = ((size - 1)<< 16) | 0 << 8 |
> > VIRGL_CCMD_SET_SHADER_IMAGES;
> > ++    cmd[i++] = PIPE_SHADER_FRAGMENT;
> > ++    memset(&cmd[i], 0, size - i);
> > ++
> > ++    virgl_renderer_submit_cmd((void *) cmd, ctx_id, size);
> > ++}
> > ++
> > ++/* Test adapted from yaojun8558...@gmail.com:
> > ++ *
> > https://gitlab.freedesktop.org/virgl/virglrenderer/-/issues/250
> > ++*/
> > ++static void test_vrend_3d_resource_overflow() {
> > ++
> > ++    struct virgl_renderer_resource_create_args resource;
> > ++    resource.handle = 0x4c474572;
> > ++    resource.target = PIPE_TEXTURE_2D_ARRAY;
> > ++    resource.format = VIRGL_FORMAT_Z24X8_UNORM;
> > ++    resource.nr_samples = 2;
> > ++    resource.last_level = 0;
> > ++    resource.array_size = 3;
> > ++    resource.bind = VIRGL_BIND_SAMPLER_VIEW;
> > ++    resource.depth = 1;
> > ++    resource.width = 8;
> > ++    resource.height = 4;
> > ++    resource.flags = 0;
> > ++
> > ++    virgl_renderer_resource_create(&resource, NULL, 0);
> > ++    virgl_renderer_ctx_attach_resource(ctx_id, resource.handle);
> > ++
> > ++    uint32_t size = 0x400;
> > ++    uint32_t cmd[size];
> > ++    int i = 0;
> > ++    cmd[i++] = (size - 1) << 16 | 0 << 8 |
> > VIRGL_CCMD_RESOURCE_INLINE_WRITE;
> > ++    cmd[i++] = resource.handle;
> > ++    cmd[i++] = 0; // level
> > ++    cmd[i++] = 0; // usage
> > ++    cmd[i++] = 0; // stride
> > ++    cmd[i++] = 0; // layer_stride
> > ++    cmd[i++] = 0; // x
> > ++    cmd[i++] = 0; // y
> > ++    cmd[i++] = 0; // z
> > ++    cmd[i++] = 8; // w
> > ++    cmd[i++] = 4; // h
> > ++    cmd[i++] = 3; // d
> > ++    memset(&cmd[i], 0, size - i);
> > ++
> > ++    virgl_renderer_submit_cmd((void *) cmd, ctx_id, size);
> > ++}
> > ++
> > ++
> > + int main()
> > + {
> > +    initialize_environment();
> > +@@ -980,6 +1035,8 @@ int main()
> > +    test_cs_nullpointer_deference();
> > +    test_vrend_set_signle_abo_heap_overflow();
> > +
> > ++   test_vrend_set_shader_images_overflow();
> > ++   test_vrend_3d_resource_overflow();
> > +
> > +    virgl_renderer_context_destroy(ctx_id);
> > +    virgl_renderer_cleanup(&cookie);
> > +--
> > +2.25.1
> > +
> > diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer/cve-
> > 2022-0175.patch b/meta/recipes-
> > graphics/virglrenderer/virglrenderer/cve-2022-0175.patch
> > new file mode 100644
> > index 0000000000..8bbb9eb579
> > --- /dev/null
> > +++ b/meta/recipes-graphics/virglrenderer/virglrenderer/cve-2022-
> > 0175.patch
> > @@ -0,0 +1,112 @@
> > +From 5ca7aca001092c557f0b6fc1ba3db7dcdab860b7 Mon Sep 17 00:00:00
> > 2001
> > +From: Gert Wollny <gert.wol...@collabora.com>
> > +Date: Tue, 30 Nov 2021 09:29:42 +0100
> > +Subject: [PATCH 1/2] vrend: clear memory when allocating a host-
> > backed memory
> > + resource
> > +
> > +Closes: #249
> > +Signed-off-by: Gert Wollny <gert.wol...@collabora.com>
> > +Reviewed-by: Chia-I Wu <olva...@gmail.com>
> > +
> > +cherry-pick from anongit.freedesktop.org/virglrenderer
> > +commit b05bb61...
> > +
> > +CVE: CVE-2022-0175
> > +Upstream-Status: Backport
> > +Signed-off-by: Joe Slater <joe.sla...@windriver.com>
> > +
> > +Patch to vrend_renderer.c modified to apply to version used by
> > hardknott.
> > +Patch to test_virgl_transfer.c unchanged.
> > +
> > +Signed-off-by: Joe Slater <joe.sla...@windriver.com>
> > +
> > +---
> > + src/vrend_renderer.c        |  2 +-
> > + tests/test_virgl_transfer.c | 51
> > +++++++++++++++++++++++++++++++++++++
> > + 2 files changed, 52 insertions(+), 1 deletion(-)
> > +
> > +diff --git a/src/vrend_renderer.c b/src/vrend_renderer.c
> > +index ad7a351..d84f785 100644
> > +--- a/src/vrend_renderer.c
> > ++++ b/src/vrend_renderer.c
> > +@@ -6646,7 +6646,7 @@ int vrend_renderer_resource_create(struct
> > vrend_renderer_resource_create_args *a
> > +       if (args->bind == VIRGL_BIND_CUSTOM) {
> > +          /* use iovec directly when attached */
> > +          gr->storage_bits |= VREND_STORAGE_HOST_SYSTEM_MEMORY;
> > +-         gr->ptr = malloc(args->width);
> > ++         gr->ptr = calloc(1, args->width);
> > +          if (!gr->ptr) {
> > +             FREE(gr);
> > +             return ENOMEM;
> > +diff --git a/tests/test_virgl_transfer.c
> > b/tests/test_virgl_transfer.c
> > +index 2c8669a..8f8e98a 100644
> > +--- a/tests/test_virgl_transfer.c
> > ++++ b/tests/test_virgl_transfer.c
> > +@@ -952,6 +952,56 @@
> > START_TEST(virgl_test_transfer_near_res_bounds_with_stride_succeeds
> > )
> > + }
> > + END_TEST
> > +
> > ++START_TEST(test_vrend_host_backed_memory_no_data_leak)
> > ++{
> > ++   struct iovec iovs[1];
> > ++   int niovs = 1;
> > ++
> > ++   struct virgl_context ctx = {0};
> > ++
> > ++   int ret = testvirgl_init_ctx_cmdbuf(&ctx);
> > ++
> > ++   struct virgl_renderer_resource_create_args res;
> > ++   res.handle = 0x400;
> > ++   res.target = PIPE_BUFFER;
> > ++   res.format = VIRGL_FORMAT_R8_UNORM;
> > ++   res.nr_samples = 0;
> > ++   res.last_level = 0;
> > ++   res.array_size = 1;
> > ++   res.bind = VIRGL_BIND_CUSTOM;
> > ++   res.depth = 1;
> > ++   res.width = 32;
> > ++   res.height = 1;
> > ++   res.flags = 0;
> > ++
> > ++   uint32_t size = 32;
> > ++   uint8_t* data = calloc(1, size);
> > ++   memset(data, 1, 32);
> > ++   iovs[0].iov_base = data;
> > ++   iovs[0].iov_len = size;
> > ++
> > ++   struct pipe_box box = {0,0,0, size, 1,1};
> > ++
> > ++   virgl_renderer_resource_create(&res, NULL, 0);
> > ++   virgl_renderer_ctx_attach_resource(ctx.ctx_id, res.handle);
> > ++
> > ++   ret = virgl_renderer_transfer_read_iov(res.handle, ctx.ctx_id,
> > 0, 0, 0,
> > ++                                          (struct virgl_box
> > *)&box, 0, iovs, niovs);
> > ++
> > ++   ck_assert_int_eq(ret, 0);
> > ++
> > ++   for (int i = 0; i < 32; ++i)
> > ++      ck_assert_int_eq(data[i], 0);
> > ++
> > ++   virgl_renderer_ctx_detach_resource(1, res.handle);
> > ++
> > ++   virgl_renderer_resource_unref(res.handle);
> > ++   free(data);
> > ++
> > ++}
> > ++END_TEST
> > ++
> > ++
> > + static Suite *virgl_init_suite(void)
> > + {
> > +   Suite *s;
> > +@@ -981,6 +1031,7 @@ static Suite *virgl_init_suite(void)
> > +   tcase_add_test(tc_core,
> > virgl_test_transfer_buffer_bad_strides);
> > +   tcase_add_test(tc_core,
> > virgl_test_transfer_2d_array_bad_layer_stride);
> > +   tcase_add_test(tc_core, virgl_test_transfer_2d_bad_level);
> > ++  tcase_add_test(tc_core,
> > test_vrend_host_backed_memory_no_data_leak);
> > +
> > +   tcase_add_loop_test(tc_core,
> > virgl_test_transfer_res_read_valid, 0, PIPE_MAX_TEXTURE_TYPES);
> > +   tcase_add_loop_test(tc_core,
> > virgl_test_transfer_res_write_valid, 0, PIPE_MAX_TEXTURE_TYPES);
> > +--
> > +2.31.1
> > +
> > diff --git a/meta/recipes-
> > graphics/virglrenderer/virglrenderer_0.8.2.bb b/meta/recipes-
> > graphics/virglrenderer/virglrenderer_0.8.2.bb
> > index 7f035f820a..d92359565a 100644
> > --- a/meta/recipes-graphics/virglrenderer/virglrenderer_0.8.2.bb
> > +++ b/meta/recipes-graphics/virglrenderer/virglrenderer_0.8.2.bb
> > @@ -13,6 +13,8 @@ SRCREV =
> > "7d204f3927be65fb3365dce01dbcd04d447a4985"
> >   SRC_URI =
> > "git://anongit.freedesktop.org/virglrenderer;branch=master \
> >             
> > file://0001-gallium-Expand-libc-check-to-be-platform-OS-check.patch
> >  \
> >             
> > file://0001-meson.build-use-python3-directly-for-python.patch \
> > +           file://cve-2022-0135.patch \
> > +           file://cve-2022-0175.patch \
> >              "
> >   
> >   S = "${WORKDIR}/git"
> 
> 

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#162285): 
https://lists.openembedded.org/g/openembedded-core/message/162285
Mute This Topic: https://lists.openembedded.org/mt/89198120/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to