diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2014-09-05 12:04:08 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-09-10 15:38:55 +0100 |
commit | f1ce75eccfd001f9ceba8597c43d671a2ca80fa2 (patch) | |
tree | b6d3f4938c6596df6c90fa33d93f54104c42ca1a /meta | |
parent | 5e1854957455131053ec7de5c98c330b97493452 (diff) | |
download | poky-f1ce75eccfd001f9ceba8597c43d671a2ca80fa2.tar.gz |
pcihp: fix possible array out of bounds, CVE-2014-5388
Prevent out-of-bounds array access on acpi_pcihp_pci_status.
[From QEMU: fa365d7cd11185237471823a5a33d36765454e16]
(From OE-Core rev: 43ba8f84fb03a8f645995b43966cb87152b69f4c)
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch | 30 | ||||
-rw-r--r-- | meta/recipes-devtools/qemu/qemu_2.1.0.bb | 1 |
2 files changed, 31 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch b/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch new file mode 100644 index 0000000000..ec541fa668 --- /dev/null +++ b/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch | |||
@@ -0,0 +1,30 @@ | |||
1 | Prevent out-of-bounds array access on | ||
2 | acpi_pcihp_pci_status. | ||
3 | |||
4 | Upstream-Status: Backport | ||
5 | |||
6 | Signed-off-by: Gonglei <arei.gonglei@huawei.com> | ||
7 | Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> | ||
8 | --- | ||
9 | v2: | ||
10 | - change commit message. | ||
11 | - add 'Reviewed-by' | ||
12 | --- | ||
13 | hw/acpi/pcihp.c | 2 +- | ||
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
15 | |||
16 | diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c | ||
17 | index fae663a..34dedf1 100644 | ||
18 | --- a/hw/acpi/pcihp.c | ||
19 | +++ b/hw/acpi/pcihp.c | ||
20 | @@ -231,7 +231,7 @@ static uint64_t pci_read(void *opaque, hwaddr addr, unsigned int size) | ||
21 | uint32_t val = 0; | ||
22 | int bsel = s->hotplug_select; | ||
23 | |||
24 | - if (bsel < 0 || bsel > ACPI_PCIHP_MAX_HOTPLUG_BUS) { | ||
25 | + if (bsel < 0 || bsel >= ACPI_PCIHP_MAX_HOTPLUG_BUS) { | ||
26 | return 0; | ||
27 | } | ||
28 | |||
29 | -- | ||
30 | 1.7.12.4 | ||
diff --git a/meta/recipes-devtools/qemu/qemu_2.1.0.bb b/meta/recipes-devtools/qemu/qemu_2.1.0.bb index 9b8337a73d..a82d0529b9 100644 --- a/meta/recipes-devtools/qemu/qemu_2.1.0.bb +++ b/meta/recipes-devtools/qemu/qemu_2.1.0.bb | |||
@@ -6,6 +6,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=441c28d2cf86e15a37fa47e15a72fbac \ | |||
6 | SRC_URI += "file://configure-fix-Darwin-target-detection.patch \ | 6 | SRC_URI += "file://configure-fix-Darwin-target-detection.patch \ |
7 | file://qemu-enlarge-env-entry-size.patch \ | 7 | file://qemu-enlarge-env-entry-size.patch \ |
8 | file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \ | 8 | file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \ |
9 | file://0001-Back-porting-security-fix-CVE-2014-5388.patch \ | ||
9 | " | 10 | " |
10 | SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2" | 11 | SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2" |
11 | SRC_URI[md5sum] = "6726977292b448cbc7f89998fac6983b" | 12 | SRC_URI[md5sum] = "6726977292b448cbc7f89998fac6983b" |