Gentoo Archives: gentoo-commits

From: "Mike Frysinger (vapier)" <vapier@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in app-emulation/qemu/files: qemu-2.1.0-CVE-2014-5388.patch CVE-2014-5388.patch
Date: Thu, 28 Aug 2014 07:36:59
Message-Id: 20140828073655.B3DBF41AA@oystercatcher.gentoo.org
1 vapier 14/08/28 07:36:55
2
3 Added: qemu-2.1.0-CVE-2014-5388.patch
4 Removed: CVE-2014-5388.patch
5 Log:
6 Clean up CVE patch #520688 by Agostino Sarubbo.
7
8 (Portage version: 2.2.10/cvs/Linux x86_64, signed Manifest commit with key D2E96200)
9
10 Revision Changes Path
11 1.1 app-emulation/qemu/files/qemu-2.1.0-CVE-2014-5388.patch
12
13 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/qemu/files/qemu-2.1.0-CVE-2014-5388.patch?rev=1.1&view=markup
14 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/qemu/files/qemu-2.1.0-CVE-2014-5388.patch?rev=1.1&content-type=text/plain
15
16 Index: qemu-2.1.0-CVE-2014-5388.patch
17 ===================================================================
18 https://bugs.gentoo.org/520688
19
20 From fa365d7cd11185237471823a5a33d36765454e16 Mon Sep 17 00:00:00 2001
21 From: Gonglei <arei.gonglei@××××××.com>
22 Date: Wed, 20 Aug 2014 13:52:30 +0800
23 Subject: [PATCH] pcihp: fix possible array out of bounds
24
25 Prevent out-of-bounds array access on
26 acpi_pcihp_pci_status.
27
28 Signed-off-by: Gonglei <arei.gonglei@××××××.com>
29 Reviewed-by: Peter Crosthwaite <peter.crosthwaite@××××××.com>
30 Reviewed-by: Michael S. Tsirkin <mst@××××××.com>
31 Signed-off-by: Michael S. Tsirkin <mst@××××××.com>
32 Cc: qemu-stable@××××××.org
33 Reviewed-by: Marcel Apfelbaum <marcel@××××××.com>
34 ---
35 hw/acpi/pcihp.c | 2 +-
36 1 file changed, 1 insertion(+), 1 deletion(-)
37
38 diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c
39 index fae663a..34dedf1 100644
40 --- a/hw/acpi/pcihp.c
41 +++ b/hw/acpi/pcihp.c
42 @@ -231,7 +231,7 @@ static uint64_t pci_read(void *opaque, hwaddr addr, unsigned int size)
43 uint32_t val = 0;
44 int bsel = s->hotplug_select;
45
46 - if (bsel < 0 || bsel > ACPI_PCIHP_MAX_HOTPLUG_BUS) {
47 + if (bsel < 0 || bsel >= ACPI_PCIHP_MAX_HOTPLUG_BUS) {
48 return 0;
49 }
50
51 --
52 2.0.0