cf91b1dfd9
CVE-2016-4952 scsi: pvscsi: out-of-bounds access issue CVE-2016-4964: scsi: mptsas infinite loop (bz #1339157) CVE-2016-5106: scsi: megasas: out-of-bounds write (bz #1339581) CVE-2016-5105: scsi: megasas: stack information leakage (bz #1339585) CVE-2016-5107: scsi: megasas: out-of-bounds read (bz #1339573) CVE-2016-4454: display: vmsvga: out-of-bounds read (bz #1340740) CVE-2016-4453: display: vmsvga: infinite loop (bz #1340744) CVE-2016-5126: block: iscsi: buffer overflow (bz #1340925) CVE-2016-5238: scsi: esp: OOB write (bz #1341932) CVE-2016-5338: scsi: esp: OOB r/w access (bz #1343325) CVE-2016-5337: scsi: megasas: information leakage (bz #1343910) Fix crash with -nodefaults -sdl (bz #1340931) Add deps on edk2-ovmf and edk2-aarch64
34 lines
1.4 KiB
Diff
34 lines
1.4 KiB
Diff
From: Prasad J Pandit <pjp@fedoraproject.org>
|
|
Date: Wed, 25 May 2016 17:55:10 +0530
|
|
Subject: [PATCH] scsi: megasas: check 'read_queue_head' index value
|
|
|
|
While doing MegaRAID SAS controller command frame lookup, routine
|
|
'megasas_lookup_frame' uses 'read_queue_head' value as an index
|
|
into 'frames[MEGASAS_MAX_FRAMES=2048]' array. Limit its value
|
|
within array bounds to avoid any OOB access.
|
|
|
|
Reported-by: Li Qiang <liqiang6-s@360.cn>
|
|
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
|
|
Message-Id: <1464179110-18593-1-git-send-email-ppandit@redhat.com>
|
|
Reviewed-by: Alexander Graf <agraf@suse.de>
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
(cherry picked from commit b60bdd1f1ee1616b7a9aeeffb4088e1ce2710fb2)
|
|
---
|
|
hw/scsi/megasas.c | 2 ++
|
|
1 file changed, 2 insertions(+)
|
|
|
|
diff --git a/hw/scsi/megasas.c b/hw/scsi/megasas.c
|
|
index bf642d4..cc66d36 100644
|
|
--- a/hw/scsi/megasas.c
|
|
+++ b/hw/scsi/megasas.c
|
|
@@ -650,7 +650,9 @@ static int megasas_init_firmware(MegasasState *s, MegasasCmd *cmd)
|
|
pa_hi = le32_to_cpu(initq->pi_addr_hi);
|
|
s->producer_pa = ((uint64_t) pa_hi << 32) | pa_lo;
|
|
s->reply_queue_head = ldl_le_pci_dma(pcid, s->producer_pa);
|
|
+ s->reply_queue_head %= MEGASAS_MAX_FRAMES;
|
|
s->reply_queue_tail = ldl_le_pci_dma(pcid, s->consumer_pa);
|
|
+ s->reply_queue_tail %= MEGASAS_MAX_FRAMES;
|
|
flags = le32_to_cpu(initq->flags);
|
|
if (flags & MFI_QUEUE_FLAG_CONTEXT64) {
|
|
s->flags |= MEGASAS_MASK_USE_QUEUE64;
|