[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT
From: |
Jason Wang |
Subject: |
[Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT_MAX |
Date: |
Tue, 25 Sep 2018 15:23:23 +0800 |
Hi:
This series tries to address the buffer overflow caused by converting
from size_t to int in several nic model and net core. This is
CVE-2018-10839.
Please review.
Thanks
Jason Wang (4):
ne2000: fix possible out of bound access in ne2000_receive
rtl8139: fix possible out of bound access
pcnet: fix possible buffer overflow
net: ignore packet size greater than INT_MAX
hw/net/ne2000.c | 4 ++--
hw/net/pcnet.c | 4 ++--
hw/net/rtl8139.c | 8 ++++----
net/net.c | 7 ++++++-
4 files changed, 14 insertions(+), 9 deletions(-)
--
2.17.1
- [Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT_MAX,
Jason Wang <=
- [Qemu-devel] [PATCH 1/4] ne2000: fix possible out of bound access in ne2000_receive, Jason Wang, 2018/09/25
- [Qemu-devel] [PATCH 2/4] rtl8139: fix possible out of bound access, Jason Wang, 2018/09/25
- [Qemu-devel] [PATCH 3/4] pcnet: fix possible buffer overflow, Jason Wang, 2018/09/25
- [Qemu-devel] [PATCH 4/4] net: ignore packet size greater than INT_MAX, Jason Wang, 2018/09/25
- Re: [Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT_MAX, Michael S. Tsirkin, 2018/09/25