Hi,
thanks for the report, this seems to keep on giving.

Initially we had:

 128 qemu (1:4.2-3ubuntu6.4) focal-security; urgency=medium

 177   * SECURITY UPDATE: out-of-bounds access via msi-x mmio operation         
      
 178     - debian/patches/ubuntu/CVE-2020-13754-1.patch: revert accepting       
      
 179       mismatching sizes in memory_region_access_valid in memory.c.         
      
 180     - debian/patches/ubuntu/CVE-2020-13754-2.patch: accept byte and word   
      
 181       access to core ACPI registers in hw/acpi/core.c.                     
      
 182     - CVE-2020-13754 

But something close to the issue you mentioned was spotted quickly and
resolved in

 113 qemu (1:4.2-3ubuntu6.5) focal; urgency=medium

 118     - as part of the stabilization this also fixes an                      
      
 119       riscv emulation issue due to the CVE-2020-13754 fixes via            
      
 120       d/p/ubuntu/hw-riscv-Allow-64-bit-access-to-SiFive-CLINT.patch   


Yet your hint made me wonder "what else" this might have been found to be 
broken and that is quite a list.


So we have already (in Focal):
https://github.com/qemu/qemu/commit/70b78d4e71494c90d2ccb40381336bc9b9a22f79

But in the meantime there also is this list::
https://github.com/qemu/qemu/commit/5c49f7ee3b98316850de6a33952a4ac47701c118 
(== ab3d207fe8 but one is from a stable branch)
https://github.com/qemu/qemu/commit/62a9b228b5fefe0f9e364dfeaf3c65022c63cdb9
https://github.com/qemu/qemu/commit/3059344f01e1bf9625570ef2e8396fa011e9431d
https://github.com/qemu/qemu/commit/e0cf02ce680f11893aca9642e76d6ae68b9375af
https://github.com/qemu/qemu/commit/dba04c3488c4699f5afe96f66e448b1d447cf3fb
https://github.com/qemu/qemu/commit/8e67fda2dd6202ccec093fda561107ba14830a17

Related but not strictly needed:
https://github.com/qemu/qemu/commit/21786c7e59847b1612406ff394958f22e5b323f8

Qemu 5.2 has all the known fixes that exist so far, thereby this is fixed in 
Hirsute.
The CVE-2020-13754 was released to X/B/F (and G, but before G released).
So IMHO X,B,G seem to need the fixups mentioned above, F needs the same minus 
the one I already added.

This will eventually need to be pushed to -security, also there is a chance 
that Mark (doing the security update) and/pr the security community had 
context/discussions about this.
For now I'll assign this to Mark for his input on this.

While we wait for Marks awnser  @nathan - could you outline steps to reproduce 
an issue related to this. For the SRU one would want commands that fail without 
the fix and work once applied.
I assume you'd have some RiscV Emulation steps we could use for that?

** Changed in: qemu (Ubuntu Focal)
     Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-13754

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914883

Title:
  hart0: trap handler failed (error -2) (Needs cherry-pick ab3d207f)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1914883/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to