Re: [Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT_MAX

2018-09-25 Thread Jason Wang
On 2018年09月25日 22:13, Michael S. Tsirkin wrote: On Tue, Sep 25, 2018 at 03:23:23PM +0800, Jason Wang wrote: Hi: This series tries to address the buffer overflow caused by converting from size_t to int in several nic model and net core. This is CVE-2018-10839. Please review. Thanks

Re: [Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT_MAX

2018-09-25 Thread Michael S. Tsirkin
On Tue, Sep 25, 2018 at 03:23:23PM +0800, Jason Wang wrote: > Hi: > > This series tries to address the buffer overflow caused by converting > from size_t to int in several nic model and net core. This is > CVE-2018-10839. > > Please review. > > Thanks Reviewed-by: Michael S. Tsirkin > Jason

[Qemu-devel] [PATCH 0/4] Fix buffer overflow for packet greater than INT_MAX

2018-09-25 Thread Jason Wang
Hi: This series tries to address the buffer overflow caused by converting from size_t to int in several nic model and net core. This is CVE-2018-10839. Please review. Thanks Jason Wang (4): ne2000: fix possible out of bound access in ne2000_receive rtl8139: fix possible out of bound access