eaa6ce4fe2
CVE-2017-5525: audio: memory leakage in ac97 (bz #1414110) CVE-2017-5526: audio: memory leakage in es1370 (bz #1414210) CVE-2016-10155 watchdog: memory leakage in i6300esb (bz #1415200) CVE-2017-5552: virtio-gpu-3d: memory leakage (bz #1415283) CVE-2017-5578: virtio-gpu: memory leakage (bz #1415797) CVE-2017-5667: sd: sdhci OOB access during multi block transfer (bz #1417560) CVE-2017-5856: scsi: megasas: memory leakage (bz #1418344) CVE-2017-5857: virtio-gpu-3d: host memory leakage in virgl_cmd_resource_unref (bz #1418383) CVE-2017-5898: usb: integer overflow in emulated_apdu_from_guest (bz #1419700) CVE-2017-5987: sd: infinite loop issue in multi block transfers (bz #1422001) CVE-2017-6058: vmxnet3: OOB access when doing vlan stripping (bz #1423359) CVE-2017-6505: usb: an infinite loop issue in ohci_service_ed_list (bz #1429434) CVE-2017-2615: cirrus: oob access while doing bitblt copy backward (bz #1418206) CVE-2017-2620: cirrus: potential arbitrary code execution (bz #1425419) Fix spice GL with new mesa/libglvnd (bz #1431905)
31 lines
1.1 KiB
Diff
31 lines
1.1 KiB
Diff
From: Dmitry Fleytman <dmitry@daynix.com>
|
|
Date: Thu, 16 Feb 2017 14:29:34 +0200
|
|
Subject: [PATCH] NetRxPkt: Do not try to pull more data than present
|
|
|
|
In case of VLAN stripping, ETH header put into a
|
|
separate buffer, therefore amont of data copied
|
|
from original IOV should be smaller.
|
|
|
|
Cc: qemu-stable@nongnu.org
|
|
Signed-off-by: Dmitry Fleytman <dmitry@daynix.com>
|
|
Signed-off-by: Jason Wang <jasowang@redhat.com>
|
|
(cherry picked from commit d5e772146d2bbc92e5126c145eddef3b2843d026)
|
|
---
|
|
hw/net/net_rx_pkt.c | 3 ++-
|
|
1 file changed, 2 insertions(+), 1 deletion(-)
|
|
|
|
diff --git a/hw/net/net_rx_pkt.c b/hw/net/net_rx_pkt.c
|
|
index 7c0beac..d38babe 100644
|
|
--- a/hw/net/net_rx_pkt.c
|
|
+++ b/hw/net/net_rx_pkt.c
|
|
@@ -96,7 +96,8 @@ net_rx_pkt_pull_data(struct NetRxPkt *pkt,
|
|
|
|
pkt->tot_len = iov_size(iov, iovcnt) - ploff + pkt->ehdr_buf_len;
|
|
pkt->vec_len = iov_copy(pkt->vec + 1, pkt->vec_len_total - 1,
|
|
- iov, iovcnt, ploff, pkt->tot_len);
|
|
+ iov, iovcnt, ploff,
|
|
+ pkt->tot_len - pkt->ehdr_buf_len);
|
|
} else {
|
|
net_rx_pkt_iovec_realloc(pkt, iovcnt);
|
|
|