From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:53250) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Xj3Rj-0000mb-1P for qemu-devel@nongnu.org; Tue, 28 Oct 2014 05:52:17 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Xj3Rb-0000S4-HR for qemu-devel@nongnu.org; Tue, 28 Oct 2014 05:52:10 -0400 Received: from mx1.redhat.com ([209.132.183.28]:36792) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Xj3Rb-0000Qx-BC for qemu-devel@nongnu.org; Tue, 28 Oct 2014 05:52:03 -0400 From: Gerd Hoffmann Date: Tue, 28 Oct 2014 10:50:37 +0100 Message-Id: <1414489842-27535-1-git-send-email-kraxel@redhat.com> Subject: [Qemu-devel] [PATCH v3 0/5] vmware-vga: fix CVE-2014-3689 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: pmatouse@redhat.com, Intel.Product.Security.Incident.Response.Team@intel.com, Don Koch , Gerd Hoffmann Hi, vmware-vga emulation lacks sanity checks in the hardware acceleration (blit + fill) functions. This patch series plugs the holes. v3 changes: * throw badcmd errors in case the rectangles fail the sanity checks. v2 changes: * small whitespace fixup. * do fullscreen update on invalid update requests. cheers, Gerd Gerd Hoffmann (5): vmware-vga: CVE-2014-3689: turn off hw accel vmware-vga: add vmsvga_verify_rect vmware-vga: use vmsvga_verify_rect in vmsvga_update_rect vmware-vga: use vmsvga_verify_rect in vmsvga_copy_rect vmware-vga: use vmsvga_verify_rect in vmsvga_fill_rect hw/display/vmware_vga.c | 116 ++++++++++++++++++++++++++++++++---------------- 1 file changed, 78 insertions(+), 38 deletions(-) -- 1.8.3.1