]> xenbits.xensource.com Git - qemu-xen-unstable.git/commitdiff
e1000: bounds packet size against buffer size
authorIan Campbell <Ian.Campbell@citrix.com>
Thu, 2 Feb 2012 13:47:06 +0000 (13:47 +0000)
committerIan Jackson <Ian.Jackson@eu.citrix.com>
Thu, 2 Feb 2012 13:48:34 +0000 (13:48 +0000)
Otherwise we can write beyond the buffer and corrupt memory.  This is tracked
as CVE-2012-0029.

Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
(Backported from qemu upstream 65f82df0d7a71ce1b10cd4c5ab08888d176ac840
 by Ian Campbell.)

Signed-off-by: Ian Campbell <Ian.Campbell@citrix.com>
hw/e1000.c

index bb3689e7b0e13fa8b8dbcbfb652c518b00dab878..97104edaf571ec0ee54091f30a86c9896d132b0c 100644 (file)
@@ -444,6 +444,8 @@ process_tx_desc(E1000State *s, struct e1000_tx_desc *dp)
             bytes = split_size;
             if (tp->size + bytes > msh)
                 bytes = msh - tp->size;
+
+            bytes = MIN(sizeof(tp->data) - tp->size, bytes);
             cpu_physical_memory_read(addr, tp->data + tp->size, bytes);
             if ((sz = tp->size + bytes) >= hdr && tp->size < hdr)
                 memmove(tp->header, tp->data, hdr);
@@ -459,6 +461,7 @@ process_tx_desc(E1000State *s, struct e1000_tx_desc *dp)
         // context descriptor TSE is not set, while data descriptor TSE is set
         DBGOUT(TXERR, "TCP segmentaion Error\n");
     } else {
+        split_size = MIN(sizeof(tp->data) - tp->size, split_size);
         cpu_physical_memory_read(addr, tp->data + tp->size, split_size);
         tp->size += split_size;
     }