Bug 1551455

Summary: incorrect locking (possible use-after-free) with bug 1481593 fix
Product: Red Hat Enterprise Linux 7 Reporter: Paolo Bonzini <pbonzini>
Component: qemu-kvm-rhevAssignee: Paolo Bonzini <pbonzini>
Status: CLOSED ERRATA QA Contact: Chao Yang <chayang>
Severity: high Docs Contact:
Priority: high    
Version: 7.5CC: chayang, coli, jen, jherrman, juzhang, knoel, michen, mrezanin, mtessun, ngu, pbonzini, qzhang, salmy, toneata, virt-maint
Target Milestone: rcKeywords: Regression, ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: qemu-kvm-rhev-2.12.0-1.el7 Doc Type: Bug Fix
Doc Text:
Previously, system calls to the address_space_to_flatview function in some cases targeted functions that were not sufficiently synchronized by the read-copy-update (RCU) mechanism. This was a potential security risk. The affected system calls have been fixed, and they can no longer be used as a vector for malicious code.
Story Points: ---
Clone Of:
: 1553775 1554929 (view as bug list) Environment:
Last Closed: 2018-11-01 11:06:51 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1553775, 1554929    

Description Paolo Bonzini 2018-03-05 08:41:32 UTC
When introducing of flatview_{read,write}, calls to address_space_to_flatview were placed outside RCU critical sections.

This is wrong and has to be fixed; even though it is unlikely to happen with standard operating systems, malicious code could use it to trigger use-after-free and heap corruption.

Patches posted upstream at:
http://patchew.org/QEMU/20180305083655.6186-1-pbonzini@redhat.com/

Comment 18 errata-xmlrpc 2018-11-01 11:06:51 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:3443