[kernel] r14543 - in dists/lenny-security/linux-2.6/debian: . patches/bugfix/x86 patches/series

Dann Frazier dannf at alioth.debian.org
Wed Nov 4 16:54:46 UTC 2009


Author: dannf
Date: Wed Nov  4 16:54:45 2009
New Revision: 14543

Log:
KVM: Prevent overflow in KVM_GET_SUPPORTED_CPUID (CVE-2009-3638)

Added:
   dists/lenny-security/linux-2.6/debian/patches/bugfix/x86/kvm-prevent-overflow-in-KVM_GET_SUPPORTED_CPUID.patch
Modified:
   dists/lenny-security/linux-2.6/debian/changelog
   dists/lenny-security/linux-2.6/debian/patches/series/19lenny2

Modified: dists/lenny-security/linux-2.6/debian/changelog
==============================================================================
--- dists/lenny-security/linux-2.6/debian/changelog	Wed Nov  4 16:29:33 2009	(r14542)
+++ dists/lenny-security/linux-2.6/debian/changelog	Wed Nov  4 16:54:45 2009	(r14543)
@@ -7,6 +7,7 @@
     (CVE-2009-3620)
   * AF_UNIX: Fix deadlock on connecting to shutdown socket (CVE-2009-3621)
   * fs: pipe.c null pointer dereference (CVE-2009-3547)
+  * KVM: Prevent overflow in KVM_GET_SUPPORTED_CPUID (CVE-2009-3638)
 
  -- dann frazier <dannf at debian.org>  Tue, 27 Oct 2009 21:33:02 -0600
 

Added: dists/lenny-security/linux-2.6/debian/patches/bugfix/x86/kvm-prevent-overflow-in-KVM_GET_SUPPORTED_CPUID.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ dists/lenny-security/linux-2.6/debian/patches/bugfix/x86/kvm-prevent-overflow-in-KVM_GET_SUPPORTED_CPUID.patch	Wed Nov  4 16:54:45 2009	(r14543)
@@ -0,0 +1,26 @@
+commit 6a54435560efdab1a08f429a954df4d6c740bddf
+Author: Avi Kivity <avi at redhat.com>
+Date:   Sun Oct 4 16:45:13 2009 +0200
+
+    KVM: Prevent overflow in KVM_GET_SUPPORTED_CPUID
+    
+    The number of entries is multiplied by the entry size, which can
+    overflow on 32-bit hosts.  Bound the entry count instead.
+    
+    Reported-by: David Wagner <daw at cs.berkeley.edu>
+    Cc: stable at kernel.org
+    Signed-off-by: Avi Kivity <avi at redhat.com>
+
+diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
+index be451ee..9b96953 100644
+--- a/arch/x86/kvm/x86.c
++++ b/arch/x86/kvm/x86.c
+@@ -1591,6 +1591,8 @@ static int kvm_dev_ioctl_get_supported_cpuid(struct kvm_cpuid2 *cpuid,
+ 
+ 	if (cpuid->nent < 1)
+ 		goto out;
++	if (cpuid->nent > KVM_MAX_CPUID_ENTRIES)
++		cpuid->nent = KVM_MAX_CPUID_ENTRIES;
+ 	r = -ENOMEM;
+ 	cpuid_entries = vmalloc(sizeof(struct kvm_cpuid_entry2) * cpuid->nent);
+ 	if (!cpuid_entries)

Modified: dists/lenny-security/linux-2.6/debian/patches/series/19lenny2
==============================================================================
--- dists/lenny-security/linux-2.6/debian/patches/series/19lenny2	Wed Nov  4 16:29:33 2009	(r14542)
+++ dists/lenny-security/linux-2.6/debian/patches/series/19lenny2	Wed Nov  4 16:54:45 2009	(r14543)
@@ -4,3 +4,4 @@
 + bugfix/all/drm+r128-Add-test-for-init-to-all-reqd-ioctls.patch
 + bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch
 + bugfix/all/fs-pipe-null-pointer-dereference.patch
++ bugfix/x86/kvm-prevent-overflow-in-KVM_GET_SUPPORTED_CPUID.patch



More information about the Kernel-svn-changes mailing list