diff options
| author | P J P | 2015-09-15 13:16:59 +0200 |
|---|---|---|
| committer | Stefan Hajnoczi | 2015-09-15 13:51:14 +0200 |
| commit | 737d2b3c41d59eb8f94ab7eb419b957938f24943 (patch) | |
| tree | de751aa25c0ae9b3ddc10e5f142c3e703a4d991b /include/exec/exec-all.h | |
| parent | net: add checks to validate ring buffer pointers(CVE-2015-5279) (diff) | |
| download | qemu-737d2b3c41d59eb8f94ab7eb419b957938f24943.tar.gz qemu-737d2b3c41d59eb8f94ab7eb419b957938f24943.tar.xz qemu-737d2b3c41d59eb8f94ab7eb419b957938f24943.zip | |
net: avoid infinite loop when receiving packets(CVE-2015-5278)
Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152)
bytes to process network packets. While receiving packets
via ne2000_receive() routine, a local 'index' variable
could exceed the ring buffer size, leading to an infinite
loop situation.
Reported-by: Qinghao Tang <luodalongde@gmail.com>
Signed-off-by: P J P <pjp@fedoraproject.org>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Diffstat (limited to 'include/exec/exec-all.h')
0 files changed, 0 insertions, 0 deletions
