Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:42.3
xen
CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch of Package xen
References: bsc#944697 From: P J P <address@hidden> While processing transmit descriptors, it could lead to an infinite loop if 'bytes' was to become zero; Add a check to avoid it. [The guest can force 'bytes' to 0 by setting the hdr_len and mss descriptor fields to 0. --Stefan] Signed-off-by: P J P <address@hidden> Signed-off-by: Stefan Hajnoczi <address@hidden> --- hw/net/e1000.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) Index: xen-4.6.1-testing/tools/qemu-xen-traditional-dir-remote/hw/e1000.c =================================================================== --- xen-4.6.1-testing.orig/tools/qemu-xen-traditional-dir-remote/hw/e1000.c +++ xen-4.6.1-testing/tools/qemu-xen-traditional-dir-remote/hw/e1000.c @@ -470,7 +470,8 @@ process_tx_desc(E1000State *s, struct e1 memmove(tp->data, tp->header, hdr); tp->size = hdr; } - } while (split_size -= bytes); + split_size -= bytes; + } while (bytes && split_size); } else if (!tp->tse && tp->cptse) { // context descriptor TSE is not set, while data descriptor TSE is set DBGOUT(TXERR, "TCP segmentaion Error\n");
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor