summaryrefslogtreecommitdiff
path: root/emulators/qemu/distinfo
diff options
context:
space:
mode:
authorkhorben <khorben@pkgsrc.org>2015-05-16 03:19:54 +0000
committerkhorben <khorben@pkgsrc.org>2015-05-16 03:19:54 +0000
commit8c87f724adf704494abc276a2a85639bb57d19d4 (patch)
treea37a194f3ba59f40835e64aa29c7639b49be57d5 /emulators/qemu/distinfo
parente71198c5cd6bc6ca09ca4bdf3000331598250f4c (diff)
downloadpkgsrc-8c87f724adf704494abc276a2a85639bb57d19d4.tar.gz
Add patch for CVE-2015-3456.
fdc: force the fifo access to be in bounds of the allocated buffer During processing of certain commands such as FD_CMD_READ_ID and FD_CMD_DRIVE_SPECIFICATION_COMMAND the fifo memory access could get out of bounds leading to memory corruption with values coming from the guest. Fix this by making sure that the index is always bounded by the allocated memory. XXX pull-up where applicable
Diffstat (limited to 'emulators/qemu/distinfo')
-rw-r--r--emulators/qemu/distinfo3
1 files changed, 2 insertions, 1 deletions
diff --git a/emulators/qemu/distinfo b/emulators/qemu/distinfo
index 20f0b5bd64a..f2d3be2ef36 100644
--- a/emulators/qemu/distinfo
+++ b/emulators/qemu/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.103 2015/04/29 20:30:53 ryoon Exp $
+$NetBSD: distinfo,v 1.104 2015/05/16 03:19:54 khorben Exp $
SHA1 (qemu-2.3.0.tar.bz2) = 373d74bfafce1ca45f85195190d0a5e22b29299e
RMD160 (qemu-2.3.0.tar.bz2) = cb203bf3faa316c9eb4ceeb975441deab6f9b2f7
@@ -6,6 +6,7 @@ Size (qemu-2.3.0.tar.bz2) = 24683085 bytes
SHA1 (patch-configure) = 2d0d2549056c9f53a932b236ed4d69a5ee58a856
SHA1 (patch-ef) = 6e57de87f91067e8a9a1388c91133a31b3582b3a
SHA1 (patch-et) = 036e1a254ce40df635dfb6107d2707879467e127
+SHA1 (patch-hw_block_fdc.c) = a49f714266b767953d78aa42492cde3ba4ecb06a
SHA1 (patch-hw_display_omap__dss.c) = 6b13242f28e32346bc70548c216c578d98fd3420
SHA1 (patch-hw_net_etraxfs__eth.c) = e5dd1661d60dbcd27b332403e0843500ba9544bc
SHA1 (patch-hw_net_xilinx__axienet.c) = ebcd2676d64ce6f31e4a8c976d4fdf530ad5e8b7