3d039dc5d8
CVE-2016-9603: cirrus: heap buffer overflow via vnc connection (bz #1432040) CVE-2017-7377: 9pfs: fix file descriptor leak (bz #1437872) CVE-2017-7980: cirrus: OOB r/w access issues in bitblt (bz #1444372) CVE-2017-8112: vmw_pvscsi: infinite loop in pvscsi_log2 (bz #1445622) CVE-2017-8309: audio: host memory lekage via capture buffer (bz #1446520) CVE-2017-8379: input: host memory lekage via keyboard events (bz #1446560) CVE-2017-8380: scsi: megasas: out-of-bounds read in megasas_mmio_write (bz #1446578) CVE-2017-9060: virtio-gpu: host memory leakage in Virtio GPU device (bz #1452598) CVE-2017-9310: net: infinite loop in e1000e NIC emulation (bz #1452623) CVE-2017-9330: usb: ohci: infinite loop due to incorrect return value (bz #1457699) CVE-2017-9374: usb: ehci host memory leakage during hotunplug (bz #1459137) CVE-2017-10806: usb-redirect: stack buffer overflow in debug logging (bz #1468497)
38 lines
1.4 KiB
Diff
38 lines
1.4 KiB
Diff
From: Gerd Hoffmann <kraxel@redhat.com>
|
|
Date: Mon, 6 Mar 2017 09:31:51 +0100
|
|
Subject: [PATCH] qxl: clear guest_cursor on QXL_CURSOR_HIDE
|
|
MIME-Version: 1.0
|
|
Content-Type: text/plain; charset=UTF-8
|
|
Content-Transfer-Encoding: 8bit
|
|
|
|
Make sure we don't leave guest_cursor pointing into nowhere. This might
|
|
lead to (rare) live migration failures, due to target trying to restore
|
|
the cursor from the stale pointer.
|
|
|
|
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1421788
|
|
Reported-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
|
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
|
|
Message-id: 1488789111-27340-1-git-send-email-kraxel@redhat.com
|
|
(cherry picked from commit dbb5fb8d3519130559b10fa4e1395e4486c633f8)
|
|
---
|
|
hw/display/qxl.c | 5 +++++
|
|
1 file changed, 5 insertions(+)
|
|
|
|
diff --git a/hw/display/qxl.c b/hw/display/qxl.c
|
|
index 62d0c80dcf..e09ce10660 100644
|
|
--- a/hw/display/qxl.c
|
|
+++ b/hw/display/qxl.c
|
|
@@ -478,6 +478,11 @@ static int qxl_track_command(PCIQXLDevice *qxl, struct QXLCommandExt *ext)
|
|
qxl->guest_cursor = ext->cmd.data;
|
|
qemu_mutex_unlock(&qxl->track_lock);
|
|
}
|
|
+ if (cmd->type == QXL_CURSOR_HIDE) {
|
|
+ qemu_mutex_lock(&qxl->track_lock);
|
|
+ qxl->guest_cursor = 0;
|
|
+ qemu_mutex_unlock(&qxl->track_lock);
|
|
+ }
|
|
break;
|
|
}
|
|
}
|