diff mbox series

package/qemu: security bump version to 8.1.1

Message ID 20231010070558.9791-1-ramirez.clement3@gmail.com
State Superseded
Headers show
Series package/qemu: security bump version to 8.1.1 | expand

Commit Message

Clément Ramirez Oct. 10, 2023, 7:05 a.m. UTC
Fixes the following CVEs :
    - CVE-2023-4135 (https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf)
    - CVE-2023-3354 (https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4)
    - CVE-2023-3180 (https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980)

The changes between 8.1.0 and 8.1.1 are only limited to bug fixes:

6bb4a8a47a (v8.1.1) Update version for 8.1.1 release
045fa84784 tpm: fix crash when FD >= 1024 and unnecessary errors due to EINTR
56270e5d3d meson: Fix targetos match for illumos and Solaris.
60da8301fe s390x/ap: fix missing subsystem reset registration
8b479229ff ui: fix crash when there are no active_console
d4919bbcc2 virtio-gpu/win32: set the destroy function on load
cae7dc1452 target/riscv: Allocate itrigger timers only once
7385e00665 target/riscv/pmp.c: respect mseccfg.RLB for pmpaddrX changes
1d4fb5815c target/riscv: fix satp_mode_finalize() when satp_mode.supported = 0
b822207513 hw/riscv: virt: Fix riscv,pmu DT node path
2947da750e linux-user/riscv: Use abi type for target_ucontext
60a7f5c8fe hw/intc: Make rtc variable names consistent
566dac7127 hw/intc: Fix upper/lower mtime write calculation
8ae20123b6 target/riscv: Fix zfa fleq.d and fltq.d
6c24b6000b target/riscv: Fix page_check_range use in fault-only-first
987e90cfd2 target/riscv/cpu.c: add zmmul isa string
b9f83298b9 hw/char/riscv_htif: Fix the console syscall on big endian hosts
3d6251f416 hw/char/riscv_htif: Fix printing of console characters on big endian hosts
9832a670b3 arm64: Restore trapless ptimer access
df33ce9b6d virtio: Drop out of coroutine context in virtio_load()
eeee989f72 qxl: don't assert() if device isn't yet initialized
93d4107937 hw/net/vmxnet3: Fix guest-triggerable assert()
6356785daa docs tests: Fix use of migrate_set_parameter
01bf87c8e3 qemu-options.hx: Rephrase the descriptions of the -hd* and -cdrom options
25ec23ab3f hw/i2c/aspeed: Fix TXBUF transmission start position error
9dc6f05cc8 hw/i2c/aspeed: Fix Tx count and Rx size error in buffer pool mode
d5361580ac hw/ide/ahci: fix broken SError handling
e8f5ca57e4 hw/ide/ahci: fix ahci_write_fis_sdb()
4448c345bc hw/ide/ahci: PxCI should not get cleared when ERR_STAT is set
4fbd5a5202 hw/ide/ahci: PxSACT and PxCI is cleared when PxCMD.ST is cleared
16cc9594d2 hw/ide/ahci: simplify and document PxCI handling
1efefd13ca hw/ide/ahci: write D2H FIS when processing NCQ command
c2e0495e3c hw/ide/core: set ERR_STAT in unsupported command completion
f64f1f8704 target/ppc: Fix LQ, STQ register-pair order for big-endian
9f54fef2c0 target/ppc: Flush inputs to zero with NJ in ppc_store_vscr
5358980d33 hw/ppc/e500: fix broken snapshot replay
6864f05cb1 ppc/vof: Fix missed fields in VOF cleanup
0175121c6c ui/dbus: Properly dispose touch/mouse dbus objects
e975434d62 target/i386: raise FERR interrupt with iothread locked
e5e77f256f linux-user: Adjust brk for load_bias
645b87f650 target/arm: properly document FEAT_CRC32
86d7b08d71 block-migration: Ensure we don't crash during migration cleanup
5691fbf440 softmmu: Assert data in bounds in iotlb_to_section
441106eebb docs/about/license: Update LICENSE URL
63188a00bb target/arm: Fix 64-bit SSRA
7012e20b2d target/arm: Fix SME ST1Q
c8e381d672 accel/kvm: Specify default IPA size for arm64
34808d041c kvm: Introduce kvm_arch_get_default_type hook
01f6417f15 include/hw/virtio/virtio-gpu: Fix virtio-gpu with blob on big endian hosts
14a8213b75 target/s390x: Check reserved bits of VFMIN/VFMAX's M5
c12eddbd48 target/s390x: Fix VSTL with a large length
880e82ed78 target/s390x: Use a 16-bit immediate in VREP
5980189e96 target/s390x: Fix the "ignored match" case in VSTRS

Signed-off-by: Clement Ramirez <ramirez.clement3@gmail.com>
---
 package/qemu/qemu.hash | 2 +-
 package/qemu/qemu.mk   | 6 +++++-
 2 files changed, 6 insertions(+), 2 deletions(-)

Comments

Baruch Siach Oct. 10, 2023, 7:47 a.m. UTC | #1
Hi Clement,

On Tue, Oct 10 2023, Clement Ramirez wrote:
> Fixes the following CVEs :
>     - CVE-2023-4135 (https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf)
>     - CVE-2023-3354 (https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4)
>     - CVE-2023-3180 (https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980)
>
> The changes between 8.1.0 and 8.1.1 are only limited to bug fixes:
>
> 6bb4a8a47a (v8.1.1) Update version for 8.1.1 release
> 045fa84784 tpm: fix crash when FD >= 1024 and unnecessary errors due to EINTR
> 56270e5d3d meson: Fix targetos match for illumos and Solaris.
> 60da8301fe s390x/ap: fix missing subsystem reset registration
> 8b479229ff ui: fix crash when there are no active_console
> d4919bbcc2 virtio-gpu/win32: set the destroy function on load
> cae7dc1452 target/riscv: Allocate itrigger timers only once
> 7385e00665 target/riscv/pmp.c: respect mseccfg.RLB for pmpaddrX changes
> 1d4fb5815c target/riscv: fix satp_mode_finalize() when satp_mode.supported = 0
> b822207513 hw/riscv: virt: Fix riscv,pmu DT node path
> 2947da750e linux-user/riscv: Use abi type for target_ucontext
> 60a7f5c8fe hw/intc: Make rtc variable names consistent
> 566dac7127 hw/intc: Fix upper/lower mtime write calculation
> 8ae20123b6 target/riscv: Fix zfa fleq.d and fltq.d
> 6c24b6000b target/riscv: Fix page_check_range use in fault-only-first
> 987e90cfd2 target/riscv/cpu.c: add zmmul isa string
> b9f83298b9 hw/char/riscv_htif: Fix the console syscall on big endian hosts
> 3d6251f416 hw/char/riscv_htif: Fix printing of console characters on big endian hosts
> 9832a670b3 arm64: Restore trapless ptimer access
> df33ce9b6d virtio: Drop out of coroutine context in virtio_load()
> eeee989f72 qxl: don't assert() if device isn't yet initialized
> 93d4107937 hw/net/vmxnet3: Fix guest-triggerable assert()
> 6356785daa docs tests: Fix use of migrate_set_parameter
> 01bf87c8e3 qemu-options.hx: Rephrase the descriptions of the -hd* and -cdrom options
> 25ec23ab3f hw/i2c/aspeed: Fix TXBUF transmission start position error
> 9dc6f05cc8 hw/i2c/aspeed: Fix Tx count and Rx size error in buffer pool mode
> d5361580ac hw/ide/ahci: fix broken SError handling
> e8f5ca57e4 hw/ide/ahci: fix ahci_write_fis_sdb()
> 4448c345bc hw/ide/ahci: PxCI should not get cleared when ERR_STAT is set
> 4fbd5a5202 hw/ide/ahci: PxSACT and PxCI is cleared when PxCMD.ST is cleared
> 16cc9594d2 hw/ide/ahci: simplify and document PxCI handling
> 1efefd13ca hw/ide/ahci: write D2H FIS when processing NCQ command
> c2e0495e3c hw/ide/core: set ERR_STAT in unsupported command completion
> f64f1f8704 target/ppc: Fix LQ, STQ register-pair order for big-endian
> 9f54fef2c0 target/ppc: Flush inputs to zero with NJ in ppc_store_vscr
> 5358980d33 hw/ppc/e500: fix broken snapshot replay
> 6864f05cb1 ppc/vof: Fix missed fields in VOF cleanup
> 0175121c6c ui/dbus: Properly dispose touch/mouse dbus objects
> e975434d62 target/i386: raise FERR interrupt with iothread locked
> e5e77f256f linux-user: Adjust brk for load_bias
> 645b87f650 target/arm: properly document FEAT_CRC32
> 86d7b08d71 block-migration: Ensure we don't crash during migration cleanup
> 5691fbf440 softmmu: Assert data in bounds in iotlb_to_section
> 441106eebb docs/about/license: Update LICENSE URL
> 63188a00bb target/arm: Fix 64-bit SSRA
> 7012e20b2d target/arm: Fix SME ST1Q
> c8e381d672 accel/kvm: Specify default IPA size for arm64
> 34808d041c kvm: Introduce kvm_arch_get_default_type hook
> 01f6417f15 include/hw/virtio/virtio-gpu: Fix virtio-gpu with blob on big endian hosts
> 14a8213b75 target/s390x: Check reserved bits of VFMIN/VFMAX's M5
> c12eddbd48 target/s390x: Fix VSTL with a large length
> 880e82ed78 target/s390x: Use a 16-bit immediate in VREP
> 5980189e96 target/s390x: Fix the "ignored match" case in VSTRS
>
> Signed-off-by: Clement Ramirez <ramirez.clement3@gmail.com>
> ---
>  package/qemu/qemu.hash | 2 +-
>  package/qemu/qemu.mk   | 6 +++++-
>  2 files changed, 6 insertions(+), 2 deletions(-)
>
> diff --git a/package/qemu/qemu.hash b/package/qemu/qemu.hash
> index 506afa8bf3..61e51a923f 100644
> --- a/package/qemu/qemu.hash
> +++ b/package/qemu/qemu.hash
> @@ -1,4 +1,4 @@
>  # Locally computed, tarball verified with GPG signature
> -sha256  710c101198e334d4762eef65f649bc43fa8a5dd75303554b8acfec3eb25f0e55  qemu-8.1.0.tar.xz
> +sha256  37ce2ef5e500fb752f681117c68b45118303ea49a7e26bd54080ced54fab7def  qemu-8.1.1.tar.xz
>  sha256  6f04ae8364d0079a192b14635f4b1da294ce18724c034c39a6a41d1b09df6100  COPYING
>  sha256  dc626520dcd53a22f727af3ee42c770e56c97a64fe3adb063799d8ab032fe551  COPYING.LIB
> diff --git a/package/qemu/qemu.mk b/package/qemu/qemu.mk
> index 6aaed32336..167ae007f0 100644
> --- a/package/qemu/qemu.mk
> +++ b/package/qemu/qemu.mk
> @@ -6,7 +6,7 @@
>  
>  # When updating the version, check whether the list of supported targets
>  # needs to be updated.
> -QEMU_VERSION = 8.1.0
> +QEMU_VERSION = 8.1.1
>  QEMU_SOURCE = qemu-$(QEMU_VERSION).tar.xz
>  QEMU_SITE = https://download.qemu.org
>  QEMU_LICENSE = GPL-2.0, LGPL-2.1, MIT, BSD-3-Clause, BSD-2-Clause, Others/BSD-1c
> @@ -16,6 +16,10 @@ QEMU_LICENSE_FILES = COPYING COPYING.LIB
>  #       individual source files.
>  QEMU_CPE_ID_VENDOR = qemu
>  
> +QEMU_IGNORE_CVES += CVE-2023-4135
> +QEMU_IGNORE_CVES += CVE-2023-3354
> +QEMU_IGNORE_CVES += CVE-2023-3180

Provided that these CVEs are fixed with this version bump, why do we
need to ignore them?

baruch

> +
>  #-------------------------------------------------------------
>  
>  # The build system is now partly based on Meson.
Clément Ramirez Oct. 10, 2023, 8:41 a.m. UTC | #2
Hi Baruch,

> Provided that these CVEs are fixed with this version bump, why do we
> need to ignore them?

When I don't ignore the CVEs fixed with the version bump, the
pkg-stats tool keeps displaying them.
I think it's because the CPE database has no entries for the qemu 8.1.1 version
and therefore does not know which CVEs are fixed in this specific version.


Clément
Baruch Siach Oct. 10, 2023, 8:54 a.m. UTC | #3
Hi Clément,

On Tue, Oct 10 2023, Clément Ramirez wrote:
>> Provided that these CVEs are fixed with this version bump, why do we
>> need to ignore them?
>
> When I don't ignore the CVEs fixed with the version bump, the
> pkg-stats tool keeps displaying them.
> I think it's because the CPE database has no entries for the qemu 8.1.1 version
> and therefore does not know which CVEs are fixed in this specific version.

This is something that should be fixed in the CPE database.

In the mean time there should be a comment that explains why we ignore
these CVEs even though they do not actually affect the current package
version.

baruch
Clément Ramirez Oct. 10, 2023, 9:15 a.m. UTC | #4
Hi Baruch,

> This is something that should be fixed in the CPE database.
>
> In the mean time there should be a comment that explains why we ignore
> these CVEs even though they do not actually affect the current package
> version.

I will try to find a way to add an entry in the CPE database, and add a
comment to explain why we are ignoring these CVEs.

Thanks for your feedbacks,
Clément
Thomas Petazzoni Nov. 1, 2023, 4:29 p.m. UTC | #5
Hello Clément,

Always happy to see some patches from you on Buildroot! :-)

On Tue, 10 Oct 2023 11:15:13 +0200
Clément Ramirez <ramirez.clement3@gmail.com> wrote:

> I will try to find a way to add an entry in the CPE database, and add a
> comment to explain why we are ignoring these CVEs.

In the end, did you send an e-mail to the NVD maintainers about this?

You actually don't need to look for how to add an entry in the CPE
database. Just drop an e-mail to the NVD maintainers, giving for each
CVE some clear evidence that there were fixed in 8.1.1, and ask them to
update the CVE entries. They will automatically take care of adding the
CPE entry, and update the CVE information.

Let me know if you want some help to achieve this.

Thanks!

Thomas
Clément Ramirez Nov. 2, 2023, 9:37 a.m. UTC | #6
Hi Thomas !

> Always happy to see some patches from you on Buildroot! :-)

Yes but I need to keep going

> > I will try to find a way to add an entry in the CPE database, and add a
> > comment to explain why we are ignoring these CVEs.
>
> In the end, did you send an e-mail to the NVD maintainers about this?

I tried to figured out how to add an entry in the CPE database indeed, and
found some tools to do it. But I wasn't sure what information i should
fill in, so
i ended not sending anything.

> You actually don't need to look for how to add an entry in the CPE
> database. Just drop an e-mail to the NVD maintainers, giving for each
> CVE some clear evidence that there were fixed in 8.1.1, and ask them to
> update the CVE entries. They will automatically take care of adding the
> CPE entry, and update the CVE information.

That will be very nice, and simpler than generating an XML entry as described
on the CPE submission web page ([0]).
I will try to email them today and I keep you updated if I encountered
some problems to do it.

[0] https://cpe.mitre.org/dictionary/#process

Thank you again for your help !

Clément
Thomas Petazzoni Nov. 2, 2023, 9:47 a.m. UTC | #7
Hello Clément,

On Thu, 2 Nov 2023 10:37:36 +0100
Clément Ramirez <ramirez.clement3@gmail.com> wrote:

> That will be very nice, and simpler than generating an XML entry as described
> on the CPE submission web page ([0]).
> I will try to email them today and I keep you updated if I encountered
> some problems to do it.

For reference, here is an e-mail I sent to them, and following which
they did fix the CVE database.

=====================================================================
From: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
To: nvd@nist.gov
Cc: "buildroot@buildroot.org" <buildroot@buildroot.org>
Subject: CVE-2021-4034 version range fix
Date: Sat, 2 Sep 2023 19:34:34 +0200
Organization: Bootlin
Message-ID: <20230902193434.4865dbd4@windsurf>

Dear NVD maintainers,

CVE-2021-4034 is marked in the NVD database as affecting all versions
of the polkit project due to the following "Configuration 1":

  cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*

However, as indicated in
https://nvd.nist.gov/vuln/detail/CVE-2021-4034, this issue has been
fixed in the upstream polkit project as of commit
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683.

In turn, this commit is integrated in polkit since version 121:

polkit$ git tag --contains a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
121
122
123

So, the "Configuration 1" should be fixed to indicate that only
versions < 121 are affected. Could this be addressed in your NVD
database?

Best regards,

Thomas Petazzoni
=====================================================================

Best regards,

Thomas
Clément Ramirez Nov. 2, 2023, 9:51 a.m. UTC | #8
That will help me a lot,

Thanks !

Le jeu. 2 nov. 2023 à 10:47, Thomas Petazzoni
<thomas.petazzoni@bootlin.com> a écrit :
>
> Hello Clément,
>
> On Thu, 2 Nov 2023 10:37:36 +0100
> Clément Ramirez <ramirez.clement3@gmail.com> wrote:
>
> > That will be very nice, and simpler than generating an XML entry as described
> > on the CPE submission web page ([0]).
> > I will try to email them today and I keep you updated if I encountered
> > some problems to do it.
>
> For reference, here is an e-mail I sent to them, and following which
> they did fix the CVE database.
>
> =====================================================================
> From: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
> To: nvd@nist.gov
> Cc: "buildroot@buildroot.org" <buildroot@buildroot.org>
> Subject: CVE-2021-4034 version range fix
> Date: Sat, 2 Sep 2023 19:34:34 +0200
> Organization: Bootlin
> Message-ID: <20230902193434.4865dbd4@windsurf>
>
> Dear NVD maintainers,
>
> CVE-2021-4034 is marked in the NVD database as affecting all versions
> of the polkit project due to the following "Configuration 1":
>
>   cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*
>
> However, as indicated in
> https://nvd.nist.gov/vuln/detail/CVE-2021-4034, this issue has been
> fixed in the upstream polkit project as of commit
> https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683.
>
> In turn, this commit is integrated in polkit since version 121:
>
> polkit$ git tag --contains a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
> 121
> 122
> 123
>
> So, the "Configuration 1" should be fixed to indicate that only
> versions < 121 are affected. Could this be addressed in your NVD
> database?
>
> Best regards,
>
> Thomas Petazzoni
> =====================================================================
>
> Best regards,
>
> Thomas
> --
> Thomas Petazzoni, co-owner and CEO, Bootlin
> Embedded Linux and Kernel engineering and training
> https://bootlin.com
diff mbox series

Patch

diff --git a/package/qemu/qemu.hash b/package/qemu/qemu.hash
index 506afa8bf3..61e51a923f 100644
--- a/package/qemu/qemu.hash
+++ b/package/qemu/qemu.hash
@@ -1,4 +1,4 @@ 
 # Locally computed, tarball verified with GPG signature
-sha256  710c101198e334d4762eef65f649bc43fa8a5dd75303554b8acfec3eb25f0e55  qemu-8.1.0.tar.xz
+sha256  37ce2ef5e500fb752f681117c68b45118303ea49a7e26bd54080ced54fab7def  qemu-8.1.1.tar.xz
 sha256  6f04ae8364d0079a192b14635f4b1da294ce18724c034c39a6a41d1b09df6100  COPYING
 sha256  dc626520dcd53a22f727af3ee42c770e56c97a64fe3adb063799d8ab032fe551  COPYING.LIB
diff --git a/package/qemu/qemu.mk b/package/qemu/qemu.mk
index 6aaed32336..167ae007f0 100644
--- a/package/qemu/qemu.mk
+++ b/package/qemu/qemu.mk
@@ -6,7 +6,7 @@ 
 
 # When updating the version, check whether the list of supported targets
 # needs to be updated.
-QEMU_VERSION = 8.1.0
+QEMU_VERSION = 8.1.1
 QEMU_SOURCE = qemu-$(QEMU_VERSION).tar.xz
 QEMU_SITE = https://download.qemu.org
 QEMU_LICENSE = GPL-2.0, LGPL-2.1, MIT, BSD-3-Clause, BSD-2-Clause, Others/BSD-1c
@@ -16,6 +16,10 @@  QEMU_LICENSE_FILES = COPYING COPYING.LIB
 #       individual source files.
 QEMU_CPE_ID_VENDOR = qemu
 
+QEMU_IGNORE_CVES += CVE-2023-4135
+QEMU_IGNORE_CVES += CVE-2023-3354
+QEMU_IGNORE_CVES += CVE-2023-3180
+
 #-------------------------------------------------------------
 
 # The build system is now partly based on Meson.