Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:GA
xen.5575
CVE-2017-11334-qemuu-exec-oob-access-during-dma...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File CVE-2017-11334-qemuu-exec-oob-access-during-dma-operation-allowing-for-DoS.patch of Package xen.5575
Subject: exec: use qemu_ram_ptr_length to access guest ram From: Prasad J Pandit pjp@fedoraproject.org Wed Jul 12 18:08:40 2017 +0530 Date: Fri Jul 14 11:04:34 2017 +0200: Git: 04bf2526ce87f21b32c9acba1c5518708c243ad0 When accessing guest's ram block during DMA operation, use 'qemu_ram_ptr_length' to get ram block pointer. It ensures that DMA operation of given length is possible; And avoids any OOB memory access situations. Reported-by: Alex <broscutamaker@gmail.com> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Message-Id: <20170712123840.29328-1-ppandit@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Index: xen-4.5.5-testing/tools/qemu-xen-dir-remote/exec.c =================================================================== --- xen-4.5.5-testing.orig/tools/qemu-xen-dir-remote/exec.c +++ xen-4.5.5-testing/tools/qemu-xen-dir-remote/exec.c @@ -2055,7 +2055,7 @@ bool address_space_rw(AddressSpace *as, } else { addr1 += memory_region_get_ram_addr(mr); /* RAM case */ - ptr = qemu_get_ram_ptr(addr1); + ptr = qemu_ram_ptr_length(addr1, &l); memcpy(ptr, buf, l); invalidate_and_set_dirty(addr1, l); } @@ -2089,7 +2089,7 @@ bool address_space_rw(AddressSpace *as, } } else { /* RAM case */ - ptr = qemu_get_ram_ptr(mr->ram_addr + addr1); + ptr = qemu_ram_ptr_length(mr->ram_addr + addr1, &l); memcpy(buf, ptr, l); } }
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor