CVE-2016-9603: cirrus: heap buffer overflow via vnc connection (bz #1432040) CVE-2017-7377: 9pfs: fix file descriptor leak (bz #1437872) CVE-2017-7980: cirrus: OOB r/w access issues in bitblt (bz #1444372) CVE-2017-8112: vmw_pvscsi: infinite loop in pvscsi_log2 (bz #1445622) CVE-2017-8309: audio: host memory lekage via capture buffer (bz #1446520) CVE-2017-8379: input: host memory lekage via keyboard events (bz #1446560) CVE-2017-8380: scsi: megasas: out-of-bounds read in megasas_mmio_write (bz #1446578) CVE-2017-9060: virtio-gpu: host memory leakage in Virtio GPU device (bz #1452598) CVE-2017-9310: net: infinite loop in e1000e NIC emulation (bz #1452623) CVE-2017-9330: usb: ohci: infinite loop due to incorrect return value (bz #1457699) CVE-2017-9374: usb: ehci host memory leakage during hotunplug (bz #1459137) CVE-2017-10806: usb-redirect: stack buffer overflow in debug logging (bz #1468497)
30 lines
1.1 KiB
Diff
30 lines
1.1 KiB
Diff
From: Li Qiang <liqiang6-s@360.cn>
|
|
Date: Tue, 13 Sep 2016 03:20:03 -0700
|
|
Subject: [PATCH] usb:xhci:fix memory leak in usb_xhci_exit
|
|
|
|
If the xhci uses msix, it doesn't free the corresponding
|
|
memory, thus leading a memory leak. This patch avoid this.
|
|
|
|
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
|
|
Message-id: 57d7d2e0.d4301c0a.d13e9.9a55@mx.google.com
|
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
(cherry picked from commit b53dd4495ced2432a0b652ea895e651d07336f7e)
|
|
---
|
|
hw/usb/hcd-xhci.c | 3 +--
|
|
1 file changed, 1 insertion(+), 2 deletions(-)
|
|
|
|
diff --git a/hw/usb/hcd-xhci.c b/hw/usb/hcd-xhci.c
|
|
index 188f95416a..281a2a59f0 100644
|
|
--- a/hw/usb/hcd-xhci.c
|
|
+++ b/hw/usb/hcd-xhci.c
|
|
@@ -3709,8 +3709,7 @@ static void usb_xhci_exit(PCIDevice *dev)
|
|
/* destroy msix memory region */
|
|
if (dev->msix_table && dev->msix_pba
|
|
&& dev->msix_entry_used) {
|
|
- memory_region_del_subregion(&xhci->mem, &dev->msix_table_mmio);
|
|
- memory_region_del_subregion(&xhci->mem, &dev->msix_pba_mmio);
|
|
+ msix_uninit(dev, &xhci->mem, &xhci->mem);
|
|
}
|
|
|
|
usb_bus_release(&xhci->bus);
|