Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12:Update
qemu
0259-pcihp-fix-possible-array-out-of-bou.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0259-pcihp-fix-possible-array-out-of-bou.patch of Package qemu
From cf386470699f067c05310c1a967425ba28737e4c Mon Sep 17 00:00:00 2001 From: Gonglei <arei.gonglei@huawei.com> Date: Wed, 20 Aug 2014 13:52:30 +0800 Subject: [PATCH] pcihp: fix possible array out of bounds Prevent out-of-bounds array access on acpi_pcihp_pci_status. Signed-off-by: Gonglei <arei.gonglei@huawei.com> Reviewed-by: Peter Crosthwaite <peter.crosthwaite@xilinx.com> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Cc: qemu-stable@nongnu.org Reviewed-by: Marcel Apfelbaum <marcel@redhat.com> (cherry picked from commit fa365d7cd11185237471823a5a33d36765454e16) [BR: CVE-2014-5388 BSC#893323] Signed-off-by: Bruce Rogers <brogers@suse.com> --- hw/acpi/pcihp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c index f80c48008c..3351f83486 100644 --- a/hw/acpi/pcihp.c +++ b/hw/acpi/pcihp.c @@ -229,7 +229,7 @@ static uint64_t pci_read(void *opaque, hwaddr addr, unsigned int size) uint32_t val = 0; int bsel = s->hotplug_select; - if (bsel < 0 || bsel > ACPI_PCIHP_MAX_HOTPLUG_BUS) { + if (bsel < 0 || bsel >= ACPI_PCIHP_MAX_HOTPLUG_BUS) { return 0; }
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor