summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2014-09-05 12:04:08 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2014-09-10 15:38:55 +0100
commitf1ce75eccfd001f9ceba8597c43d671a2ca80fa2 (patch)
treeb6d3f4938c6596df6c90fa33d93f54104c42ca1a /meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch
parent5e1854957455131053ec7de5c98c330b97493452 (diff)
downloadpoky-f1ce75eccfd001f9ceba8597c43d671a2ca80fa2.tar.gz
pcihp: fix possible array out of bounds, CVE-2014-5388
Prevent out-of-bounds array access on acpi_pcihp_pci_status. [From QEMU: fa365d7cd11185237471823a5a33d36765454e16] (From OE-Core rev: 43ba8f84fb03a8f645995b43966cb87152b69f4c) Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch')
-rw-r--r--meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch30
1 files changed, 30 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch b/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch
new file mode 100644
index 0000000000..ec541fa668
--- /dev/null
+++ b/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch
@@ -0,0 +1,30 @@
1Prevent out-of-bounds array access on
2acpi_pcihp_pci_status.
3
4Upstream-Status: Backport
5
6Signed-off-by: Gonglei <arei.gonglei@huawei.com>
7Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
8---
9v2:
10 - change commit message.
11 - add 'Reviewed-by'
12---
13 hw/acpi/pcihp.c | 2 +-
14 1 file changed, 1 insertion(+), 1 deletion(-)
15
16diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c
17index fae663a..34dedf1 100644
18--- a/hw/acpi/pcihp.c
19+++ b/hw/acpi/pcihp.c
20@@ -231,7 +231,7 @@ static uint64_t pci_read(void *opaque, hwaddr addr, unsigned int size)
21 uint32_t val = 0;
22 int bsel = s->hotplug_select;
23
24- if (bsel < 0 || bsel > ACPI_PCIHP_MAX_HOTPLUG_BUS) {
25+ if (bsel < 0 || bsel >= ACPI_PCIHP_MAX_HOTPLUG_BUS) {
26 return 0;
27 }
28
29--
301.7.12.4