Files
poky/meta/recipes-devtools/qemu/files/0001-Back-porting-security-fix-CVE-2014-5388.patch
Sona Sarmadi f1ce75eccf pcihp: fix possible array out of bounds, CVE-2014-5388
Prevent out-of-bounds array access on acpi_pcihp_pci_status.

[From QEMU: fa365d7cd11185237471823a5a33d36765454e16]

(From OE-Core rev: 43ba8f84fb03a8f645995b43966cb87152b69f4c)

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-09-10 15:38:55 +01:00

31 lines
748 B
Diff

Prevent out-of-bounds array access on
acpi_pcihp_pci_status.
Upstream-Status: Backport
Signed-off-by: Gonglei <arei.gonglei@huawei.com>
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
---
v2:
- change commit message.
- add 'Reviewed-by'
---
hw/acpi/pcihp.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c
index fae663a..34dedf1 100644
--- a/hw/acpi/pcihp.c
+++ b/hw/acpi/pcihp.c
@@ -231,7 +231,7 @@ static uint64_t pci_read(void *opaque, hwaddr addr, unsigned int size)
uint32_t val = 0;
int bsel = s->hotplug_select;
- if (bsel < 0 || bsel > ACPI_PCIHP_MAX_HOTPLUG_BUS) {
+ if (bsel < 0 || bsel >= ACPI_PCIHP_MAX_HOTPLUG_BUS) {
return 0;
}
--
1.7.12.4