Hi,

I've attached a patch that should fix this problem to this message.
It's based on the patch used to fix this problem in unstable, which
doesn't apply cleanly to the stable version.  I wasn't sure what do to
about the patch headers, so I left them unchanged.  Should I upload a
fixed package somewhere?

-- 
Matt Kraai
https://ftbfs.org/kraai
commit 65f82df0d7a71ce1b10cd4c5ab08888d176ac840
Author: Anthony Liguori <aligu...@us.ibm.com>
Date:   Mon Jan 23 07:30:43 2012 -0600

    e1000: bounds packet size against buffer size
    
    Otherwise we can write beyond the buffer and corrupt memory.  This is tracked
    as CVE-2012-0029.
    
    Signed-off-by: Anthony Liguori <aligu...@us.ibm.com>

Index: qemu-kvm-0.12.5+dfsg/hw/e1000.c
===================================================================
--- qemu-kvm-0.12.5+dfsg.orig/hw/e1000.c	2010-07-26 17:43:53.000000000 -0700
+++ qemu-kvm-0.12.5+dfsg/hw/e1000.c	2012-01-27 14:57:35.000000000 -0800
@@ -453,6 +453,8 @@
             bytes = split_size;
             if (tp->size + bytes > msh)
                 bytes = msh - tp->size;
+
+            bytes = MIN(sizeof(tp->data) - tp->size, bytes);
             cpu_physical_memory_read(addr, tp->data + tp->size, bytes);
             if ((sz = tp->size + bytes) >= hdr && tp->size < hdr)
                 memmove(tp->header, tp->data, hdr);
@@ -468,6 +470,7 @@
         // context descriptor TSE is not set, while data descriptor TSE is set
         DBGOUT(TXERR, "TCP segmentaion Error\n");
     } else {
+        split_size = MIN(sizeof(tp->data) - tp->size, split_size);
         cpu_physical_memory_read(addr, tp->data + tp->size, split_size);
         tp->size += split_size;
     }

Reply via email to