head 1.2; access; symbols pkgsrc-2013Q2:1.2.0.2 pkgsrc-2013Q2-base:1.2; locks; strict; comment @# @; 1.2 date 2013.01.20.15.21.54; author drochner; state dead; branches; next 1.1; 1.1 date 2013.01.17.19.37.55; author drochner; state Exp; branches; next ; desc @@ 1.2 log @oops, a patch was in the wrong sub-pkg bump PKGREV @ text @$NetBSD: patch-CVE-2012-6075,v 1.1 2013/01/17 19:37:55 drochner Exp $ see http://lists.xen.org/archives/html/xen-devel/2013-01/msg01070.html --- tools/ioemu-qemu-xen/hw/e1000.c.orig 2012-11-13 18:25:17.000000000 +0000 +++ tools/ioemu-qemu-xen/hw/e1000.c @@@@ -55,6 +55,11 @@@@ static int debugflags = DBGBIT(TXERR) | #define REG_IOADDR 0x0 #define REG_IODATA 0x4 +/* this is the size past which hardware will drop packets when setting LPE=0 */ +#define MAXIMUM_ETHERNET_VLAN_SIZE 1522 +/* this is the size past which hardware will drop packets when setting LPE=1 */ +#define MAXIMUM_ETHERNET_LPE_SIZE 16384 + /* * HW models: * E1000_DEV_ID_82540EM works with Windows and Linux @@@@ -628,6 +633,15 @@@@ e1000_receive(void *opaque, const uint8_ return; } + /* Discard oversized packets if !LPE and !SBP. */ + if ((size > MAXIMUM_ETHERNET_LPE_SIZE || + (size > MAXIMUM_ETHERNET_VLAN_SIZE + && !(s->mac_reg[RCTL] & E1000_RCTL_LPE))) + && !(s->mac_reg[RCTL] & E1000_RCTL_SBP)) { + DBGOUT(RX, "packet too large for applicable LPE/VLAN size\n"); + return; + } + if (!receive_filter(s, buf, size)) return; @ 1.1 log @update to 4.1.4 changes: -fixes for many vulnerabilities (were mostly patched in pkgsrc) -bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are: -A fix for a long standing time management issue -Bug fixes for S3 (suspend to RAM) handling -Bug fixes for other low level system state handling pkgsrc note: fixes for CVE-2012-5634 (interrupt issue on IOMMU systems) and CVE-2012-6075 (oversized packets from e1000 driver) are already included @ text @d1 1 a1 1 $NetBSD$ @