From: | "Mike Frysinger (vapier)" <vapier@g.o> |
---|---|
To: | gentoo-commits@l.g.o |
Subject: | [gentoo-commits] gentoo-x86 commit in app-emulation/qemu/files: qemu-2.1.0-CVE-2014-5388.patch CVE-2014-5388.patch |
Date: | Thu, 28 Aug 2014 07:36:59 |
Message-Id: | 20140828073655.B3DBF41AA@oystercatcher.gentoo.org |
1 | vapier 14/08/28 07:36:55 |
2 | |
3 | Added: qemu-2.1.0-CVE-2014-5388.patch |
4 | Removed: CVE-2014-5388.patch |
5 | Log: |
6 | Clean up CVE patch #520688 by Agostino Sarubbo. |
7 | |
8 | (Portage version: 2.2.10/cvs/Linux x86_64, signed Manifest commit with key D2E96200) |
9 | |
10 | Revision Changes Path |
11 | 1.1 app-emulation/qemu/files/qemu-2.1.0-CVE-2014-5388.patch |
12 | |
13 | file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/qemu/files/qemu-2.1.0-CVE-2014-5388.patch?rev=1.1&view=markup |
14 | plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/qemu/files/qemu-2.1.0-CVE-2014-5388.patch?rev=1.1&content-type=text/plain |
15 | |
16 | Index: qemu-2.1.0-CVE-2014-5388.patch |
17 | =================================================================== |
18 | https://bugs.gentoo.org/520688 |
19 | |
20 | From fa365d7cd11185237471823a5a33d36765454e16 Mon Sep 17 00:00:00 2001 |
21 | From: Gonglei <arei.gonglei@××××××.com> |
22 | Date: Wed, 20 Aug 2014 13:52:30 +0800 |
23 | Subject: [PATCH] pcihp: fix possible array out of bounds |
24 | |
25 | Prevent out-of-bounds array access on |
26 | acpi_pcihp_pci_status. |
27 | |
28 | Signed-off-by: Gonglei <arei.gonglei@××××××.com> |
29 | Reviewed-by: Peter Crosthwaite <peter.crosthwaite@××××××.com> |
30 | Reviewed-by: Michael S. Tsirkin <mst@××××××.com> |
31 | Signed-off-by: Michael S. Tsirkin <mst@××××××.com> |
32 | Cc: qemu-stable@××××××.org |
33 | Reviewed-by: Marcel Apfelbaum <marcel@××××××.com> |
34 | --- |
35 | hw/acpi/pcihp.c | 2 +- |
36 | 1 file changed, 1 insertion(+), 1 deletion(-) |
37 | |
38 | diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c |
39 | index fae663a..34dedf1 100644 |
40 | --- a/hw/acpi/pcihp.c |
41 | +++ b/hw/acpi/pcihp.c |
42 | @@ -231,7 +231,7 @@ static uint64_t pci_read(void *opaque, hwaddr addr, unsigned int size) |
43 | uint32_t val = 0; |
44 | int bsel = s->hotplug_select; |
45 | |
46 | - if (bsel < 0 || bsel > ACPI_PCIHP_MAX_HOTPLUG_BUS) { |
47 | + if (bsel < 0 || bsel >= ACPI_PCIHP_MAX_HOTPLUG_BUS) { |
48 | return 0; |
49 | } |
50 | |
51 | -- |
52 | 2.0.0 |