Michael S. Tsirkin caa881abe0 pxa2xx: avoid buffer overrun on incoming migration
CVE-2013-4533

s->rx_level is read from the wire and used to determine how many bytes
to subsequently read into s->rx_fifo[]. If s->rx_level exceeds the
length of s->rx_fifo[] the buffer can be overrun with arbitrary data
from the wire.

Fix this by validating rx_level against the size of s->rx_fifo.

Cc: Don Koch <dkoch@verizon.com>
Reported-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Don Koch <dkoch@verizon.com>
Signed-off-by: Juan Quintela <quintela@redhat.com>
2014-05-05 22:15:02 +02:00
2014-04-23 10:28:14 +02:00
2014-05-01 16:02:45 +01:00
2014-04-25 12:59:57 +02:00
2014-04-28 13:43:17 +01:00
2014-04-28 08:55:31 +04:00
2014-04-25 09:19:58 -04:00
2014-04-30 14:39:58 +02:00
2014-04-28 11:06:35 -07:00
2014-05-02 10:50:58 +01:00
2014-04-28 13:43:17 +01:00
2014-04-28 08:55:31 +04:00
2014-04-30 11:05:00 +02:00
2014-03-19 19:47:15 +01:00
2014-03-27 15:19:00 +05:30
2014-04-18 10:33:36 +04:00
2014-03-27 15:19:00 +05:30
2014-04-22 12:00:20 +02:00
2014-04-22 12:00:20 +02:00
2014-04-28 13:43:17 +01:00
2014-04-17 20:39:32 +01:00

Read the documentation in qemu-doc.html or on http://wiki.qemu-project.org

- QEMU team
Description
No description provided
Readme 404 MiB
Languages
C 82.6%
C++ 6.5%
Python 3.4%
Dylan 2.9%
Shell 1.6%
Other 2.8%