Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
xen.5015
CVE-2016-5107-qemuu-scsi-megasas-out-of-bounds-...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File CVE-2016-5107-qemuu-scsi-megasas-out-of-bounds-read-in-megasas_lookup_frame-function.patch of Package xen.5015
References: bsc#982026 CVE-2016-5107 While doing MegaRAID SAS controller command frame lookup, routine 'megasas_lookup_frame' uses 'read_queue_head' value as an index into 'frames[MEGASAS_MAX_FRAMES=2048]' array. Limit its value within array bounds to avoid any OOB access. Reported-by: Li Qiang <address@hidden> Signed-off-by: Prasad J Pandit <address@hidden> --- hw/scsi/megasas.c | 2 ++ 1 file changed, 2 insertions(+) Update as per -> https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg04403.html Index: xen-4.4.4-testing/tools/qemu-xen-dir-remote/hw/scsi/megasas.c =================================================================== --- xen-4.4.4-testing.orig/tools/qemu-xen-dir-remote/hw/scsi/megasas.c +++ xen-4.4.4-testing/tools/qemu-xen-dir-remote/hw/scsi/megasas.c @@ -603,7 +603,9 @@ static int megasas_init_firmware(Megasas pa_hi = le32_to_cpu(initq->pi_addr_hi); s->producer_pa = ((uint64_t) pa_hi << 32) | pa_lo; s->reply_queue_head = ldl_le_phys(s->producer_pa); + s->reply_queue_head %= MEGASAS_MAX_FRAMES; s->reply_queue_tail = ldl_le_phys(s->consumer_pa); + s->reply_queue_tail %= MEGASAS_MAX_FRAMES; flags = le32_to_cpu(initq->flags); if (flags & MFI_QUEUE_FLAG_CONTEXT64) { s->flags |= MEGASAS_MASK_USE_QUEUE64;
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor