]> xenbits.xensource.com Git - qemu-upstream-4.4-testing.git/commit
pcnet: fix rx buffer overflow(CVE-2015-7512)
authorJason Wang <jasowang@redhat.com>
Mon, 30 Nov 2015 07:00:06 +0000 (15:00 +0800)
committerStefano Stabellini <stefano.stabellini@eu.citrix.com>
Fri, 5 Feb 2016 14:53:54 +0000 (14:53 +0000)
commit5e4b77ec2c43b3230c717e4470a7c89465fc87c5
tree53d76df3a5606900920223bab3abd16fb94ed388
parent6178660b8f4891bdf4810be5b9f9e9aabebda1ed
pcnet: fix rx buffer overflow(CVE-2015-7512)

Backends could provide a packet whose length is greater than buffer
size. Check for this and truncate the packet to avoid rx buffer
overflow in this case.

Cc: Prasad J Pandit <pjp@fedoraproject.org>
Cc: qemu-stable@nongnu.org
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Jason Wang <jasowang@redhat.com>
hw/net/pcnet.c