From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:57356) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ao9A1-0006YL-S6 for qemu-devel@nongnu.org; Thu, 07 Apr 2016 08:35:51 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1ao99w-0005Sf-4m for qemu-devel@nongnu.org; Thu, 07 Apr 2016 08:35:45 -0400 Received: from mx1.redhat.com ([209.132.183.28]:37320) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ao99v-0005Sb-VU for qemu-devel@nongnu.org; Thu, 07 Apr 2016 08:35:40 -0400 From: P J P Date: Thu, 7 Apr 2016 18:05:29 +0530 Message-Id: <1460032529-26199-1-git-send-email-ppandit@redhat.com> Subject: [Qemu-devel] [PATCH v2] net: stellaris_enet: check packet length against receive buffer List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Qemu Developers Cc: Oleksandr Bazhaniuk , Peter Maydell , Jason Wang , Prasad J Pandit From: Prasad J Pandit When receiving packets over Stellaris ethernet controller, it uses receive buffer of size 2048 bytes. In case the controller accepts large(MTU) packets, it could lead to memory corruption. Add check to avoid it. Reported by: Oleksandr Bazhaniuk Signed-off-by: Prasad J Pandit --- hw/net/stellaris_enet.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) Update per review: -> https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01142.html diff --git a/hw/net/stellaris_enet.c b/hw/net/stellaris_enet.c index 21a4773..eddbe60 100644 --- a/hw/net/stellaris_enet.c +++ b/hw/net/stellaris_enet.c @@ -235,8 +235,16 @@ static ssize_t stellaris_enet_receive(NetClientState *nc, const uint8_t *buf, si n = s->next_packet + s->np; if (n >= 31) n -= 31; + if (size >= sizeof(s->rx[n].data) - 6) { + /* If the packet won't fit into the + * emulated 2K RAM, this is reported + * as a FIFO overrun error. + */ + s->ris |= SE_INT_FOV; + stellaris_enet_update(s); + return -1; + } s->np++; - s->rx[n].len = size + 6; p = s->rx[n].data; *(p++) = (size + 6); -- 2.5.5