Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
No build reason found for config:i586
SUSE:SLE-12-SP2:Update
xen.12882
CVE-2019-6778-qemut-A-heap-buffer-overflow-in-t...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File CVE-2019-6778-qemut-A-heap-buffer-overflow-in-tcp_emu-found-in-slirp.patch of Package xen.12882
References: bsc#1123157 CVE-2019-6778 While emulating identification protocol, tcp_emu() does not check available space in the 'sc_rcv->sb_data' buffer. It could lead to heap buffer overflow issue. Add check to avoid it. Reported-by: Kira <address@hidden> Signed-off-by: Prasad J Pandit <address@hidden> Signed-off-by: Samuel Thibault <address@hidden> --- slirp/tcp_subr.c | 5 +++++ 1 file changed, 5 insertions(+) Index: xen-4.7.6-testing/tools/qemu-xen-traditional-dir-remote/slirp/tcp_subr.c =================================================================== --- xen-4.7.6-testing.orig/tools/qemu-xen-traditional-dir-remote/slirp/tcp_subr.c +++ xen-4.7.6-testing/tools/qemu-xen-traditional-dir-remote/slirp/tcp_subr.c @@ -648,6 +648,11 @@ tcp_emu(so, m) socklen_t addrlen = sizeof(struct sockaddr_in); struct sbuf *so_rcv = &so->so_rcv; + if (m->m_len > so_rcv->sb_datalen + - (so_rcv->sb_wptr - so_rcv->sb_data)) { + return 1; + } + memcpy(so_rcv->sb_wptr, m->m_data, m->m_len); so_rcv->sb_wptr += m->m_len; so_rcv->sb_rptr += m->m_len;
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor