39134eb9d2
on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch - bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch - bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch - bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=395
44 lines
1.6 KiB
Diff
44 lines
1.6 KiB
Diff
From: Prasad J Pandit <address@hidden>
|
|
|
|
While doing ioport r/w operations, ne2000 device emulation suffers
|
|
from OOB r/w errors. Update respective array bounds check to avoid
|
|
OOB access.
|
|
|
|
Reported-by: Ling Liu <address@hidden>
|
|
Signed-off-by: Prasad J Pandit <address@hidden>
|
|
---
|
|
hw/net/ne2000.c | 10 ++++++----
|
|
1 file changed, 6 insertions(+), 4 deletions(-)
|
|
|
|
Updated as per review in
|
|
-> https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg04863.html
|
|
|
|
Index: xen-4.6.0-testing/tools/qemu-xen-dir-remote/hw/net/ne2000.c
|
|
===================================================================
|
|
--- xen-4.6.0-testing.orig/tools/qemu-xen-dir-remote/hw/net/ne2000.c
|
|
+++ xen-4.6.0-testing/tools/qemu-xen-dir-remote/hw/net/ne2000.c
|
|
@@ -476,8 +476,9 @@ static inline void ne2000_mem_writel(NE2
|
|
uint32_t val)
|
|
{
|
|
addr &= ~1; /* XXX: check exact behaviour if not even */
|
|
- if (addr < 32 ||
|
|
- (addr >= NE2000_PMEM_START && addr < NE2000_MEM_SIZE)) {
|
|
+ if (addr < 32
|
|
+ || (addr >= NE2000_PMEM_START
|
|
+ && addr + sizeof(uint32_t) <= NE2000_MEM_SIZE)) {
|
|
stl_le_p(s->mem + addr, val);
|
|
}
|
|
}
|
|
@@ -506,8 +507,9 @@ static inline uint32_t ne2000_mem_readw(
|
|
static inline uint32_t ne2000_mem_readl(NE2000State *s, uint32_t addr)
|
|
{
|
|
addr &= ~1; /* XXX: check exact behaviour if not even */
|
|
- if (addr < 32 ||
|
|
- (addr >= NE2000_PMEM_START && addr < NE2000_MEM_SIZE)) {
|
|
+ if (addr < 32
|
|
+ || (addr >= NE2000_PMEM_START
|
|
+ && addr + sizeof(uint32_t) <= NE2000_MEM_SIZE)) {
|
|
return ldl_le_p(s->mem + addr);
|
|
} else {
|
|
return 0xffffffff;
|