]> xenbits.xensource.com Git - qemu-xen.git/commitdiff
pcnet: fix rx buffer overflow(CVE-2015-7512)
authorJason Wang <jasowang@redhat.com>
Mon, 30 Nov 2015 07:00:06 +0000 (15:00 +0800)
committerStefano Stabellini <stefano.stabellini@eu.citrix.com>
Fri, 5 Feb 2016 14:47:09 +0000 (14:47 +0000)
Backends could provide a packet whose length is greater than buffer
size. Check for this and truncate the packet to avoid rx buffer
overflow in this case.

Cc: Prasad J Pandit <pjp@fedoraproject.org>
Cc: qemu-stable@nongnu.org
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Jason Wang <jasowang@redhat.com>
hw/pcnet.c

index c2d8abcb93b0f71fa5faad45a0eaf18ac09cbd23..22d20bbc9ce0fd1712e14b0527df80688194d9bf 100644 (file)
@@ -1083,6 +1083,12 @@ ssize_t pcnet_receive(NetClientState *nc, const uint8_t *buf, size_t size_)
             int pktcount = 0;
 
             if (!s->looptest) {
+                if (size > 4092) {
+#ifdef PCNET_DEBUG_RMD
+                    fprintf(stderr, "pcnet: truncates rx packet.\n");
+#endif
+                    size = 4092;
+                }
                 memcpy(src, buf, size);
                 /* no need to compute the CRC */
                 src[size] = 0;