Hi, I've attached a patch that should fix this problem to this message. It's based on the patch used to fix this problem in unstable, which doesn't apply cleanly to the stable version. I wasn't sure what do to about the patch headers, so I left them unchanged. Should I upload a fixed package somewhere?
-- Matt Kraai https://ftbfs.org/kraai
commit 65f82df0d7a71ce1b10cd4c5ab08888d176ac840 Author: Anthony Liguori <aligu...@us.ibm.com> Date: Mon Jan 23 07:30:43 2012 -0600 e1000: bounds packet size against buffer size Otherwise we can write beyond the buffer and corrupt memory. This is tracked as CVE-2012-0029. Signed-off-by: Anthony Liguori <aligu...@us.ibm.com> Index: qemu-kvm-0.12.5+dfsg/hw/e1000.c =================================================================== --- qemu-kvm-0.12.5+dfsg.orig/hw/e1000.c 2010-07-26 17:43:53.000000000 -0700 +++ qemu-kvm-0.12.5+dfsg/hw/e1000.c 2012-01-27 14:57:35.000000000 -0800 @@ -453,6 +453,8 @@ bytes = split_size; if (tp->size + bytes > msh) bytes = msh - tp->size; + + bytes = MIN(sizeof(tp->data) - tp->size, bytes); cpu_physical_memory_read(addr, tp->data + tp->size, bytes); if ((sz = tp->size + bytes) >= hdr && tp->size < hdr) memmove(tp->header, tp->data, hdr); @@ -468,6 +470,7 @@ // context descriptor TSE is not set, while data descriptor TSE is set DBGOUT(TXERR, "TCP segmentaion Error\n"); } else { + split_size = MIN(sizeof(tp->data) - tp->size, split_size); cpu_physical_memory_read(addr, tp->data + tp->size, split_size); tp->size += split_size; }