qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than


From: Jason Wang
Subject: Re: [Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT_MAX
Date: Wed, 26 Sep 2018 10:02:21 +0800
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1



On 2018年09月25日 22:13, Michael S. Tsirkin wrote:
On Tue, Sep 25, 2018 at 03:23:23PM +0800, Jason Wang wrote:
Hi:

This series tries to address the buffer overflow caused by converting
from size_t to int in several nic model and net core. This is
CVE-2018-10839.

Please review.

Thanks
Reviewed-by: Michael S. Tsirkin <address@hidden>

Applied.

Thanks


Jason Wang (4):
   ne2000: fix possible out of bound access in ne2000_receive
   rtl8139: fix possible out of bound access
   pcnet: fix possible buffer overflow
   net: ignore packet size greater than INT_MAX

  hw/net/ne2000.c  | 4 ++--
  hw/net/pcnet.c   | 4 ++--
  hw/net/rtl8139.c | 8 ++++----
  net/net.c        | 7 ++++++-
  4 files changed, 14 insertions(+), 9 deletions(-)

--
2.17.1




reply via email to

[Prev in Thread] Current Thread [Next in Thread]