eaa6ce4fe2
CVE-2017-5525: audio: memory leakage in ac97 (bz #1414110) CVE-2017-5526: audio: memory leakage in es1370 (bz #1414210) CVE-2016-10155 watchdog: memory leakage in i6300esb (bz #1415200) CVE-2017-5552: virtio-gpu-3d: memory leakage (bz #1415283) CVE-2017-5578: virtio-gpu: memory leakage (bz #1415797) CVE-2017-5667: sd: sdhci OOB access during multi block transfer (bz #1417560) CVE-2017-5856: scsi: megasas: memory leakage (bz #1418344) CVE-2017-5857: virtio-gpu-3d: host memory leakage in virgl_cmd_resource_unref (bz #1418383) CVE-2017-5898: usb: integer overflow in emulated_apdu_from_guest (bz #1419700) CVE-2017-5987: sd: infinite loop issue in multi block transfers (bz #1422001) CVE-2017-6058: vmxnet3: OOB access when doing vlan stripping (bz #1423359) CVE-2017-6505: usb: an infinite loop issue in ohci_service_ed_list (bz #1429434) CVE-2017-2615: cirrus: oob access while doing bitblt copy backward (bz #1418206) CVE-2017-2620: cirrus: potential arbitrary code execution (bz #1425419) Fix spice GL with new mesa/libglvnd (bz #1431905)
33 lines
1.0 KiB
Diff
33 lines
1.0 KiB
Diff
From: Li Qiang <liq3ea@gmail.com>
|
|
Date: Thu, 29 Dec 2016 04:28:41 -0500
|
|
Subject: [PATCH] virtio-gpu: fix memory leak in resource attach backing
|
|
|
|
In the resource attach backing function, everytime it will
|
|
allocate 'res->iov' thus can leading a memory leak. This
|
|
patch avoid this.
|
|
|
|
Signed-off-by: Li Qiang <liq3ea@gmail.com>
|
|
Message-id: 1483003721-65360-1-git-send-email-liq3ea@gmail.com
|
|
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
(cherry picked from commit 204f01b30975923c64006f8067f0937b91eea68b)
|
|
---
|
|
hw/display/virtio-gpu.c | 5 +++++
|
|
1 file changed, 5 insertions(+)
|
|
|
|
diff --git a/hw/display/virtio-gpu.c b/hw/display/virtio-gpu.c
|
|
index 8903dee..cadd7d8 100644
|
|
--- a/hw/display/virtio-gpu.c
|
|
+++ b/hw/display/virtio-gpu.c
|
|
@@ -708,6 +708,11 @@ virtio_gpu_resource_attach_backing(VirtIOGPU *g,
|
|
return;
|
|
}
|
|
|
|
+ if (res->iov) {
|
|
+ cmd->error = VIRTIO_GPU_RESP_ERR_UNSPEC;
|
|
+ return;
|
|
+ }
|
|
+
|
|
ret = virtio_gpu_create_mapping_iov(&ab, cmd, &res->addrs, &res->iov);
|
|
if (ret != 0) {
|
|
cmd->error = VIRTIO_GPU_RESP_ERR_UNSPEC;
|