[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-stable] [PULL for-2.4 0/7] Rtl8139 cplus tx input validation p
From: |
Peter Maydell |
Subject: |
Re: [Qemu-stable] [PULL for-2.4 0/7] Rtl8139 cplus tx input validation patches |
Date: |
Mon, 3 Aug 2015 14:08:28 +0100 |
On 3 August 2015 at 13:08, Stefan Hajnoczi <address@hidden> wrote:
> The following changes since commit cb48f67ad8c7b33c617d4f8144a27706e69fd688:
>
> bsd-user: Fix operand to cpu_x86_exec (2015-07-30 12:38:49 +0100)
>
> are available in the git repository at:
>
> git://github.com/stefanha/qemu.git
> tags/rtl8139-cplus-tx-input-validation-pull-request
>
> for you to fetch changes up to 8357946b15f0a31f73dd691b7da95f29318ed310:
>
> rtl8139: check TCP Data Offset field (CVE-2015-5165) (2015-08-03 13:08:10
> +0100)
>
> ----------------------------------------------------------------
> Pull request
>
Applied, thanks.
-- PMM
- [Qemu-stable] [PULL for-2.4 0/7] Rtl8139 cplus tx input validation patches, Stefan Hajnoczi, 2015/08/03
- [Qemu-stable] [PULL for-2.4 6/7] rtl8139: skip offload on short TCP header (CVE-2015-5165), Stefan Hajnoczi, 2015/08/03
- [Qemu-stable] [PULL for-2.4 4/7] rtl8139: check IP Header Length field (CVE-2015-5165), Stefan Hajnoczi, 2015/08/03
- [Qemu-stable] [PULL for-2.4 1/7] rtl8139: avoid nested ifs in IP header parsing (CVE-2015-5165), Stefan Hajnoczi, 2015/08/03
- [Qemu-stable] [PULL for-2.4 5/7] rtl8139: check IP Total Length field (CVE-2015-5165), Stefan Hajnoczi, 2015/08/03
- [Qemu-stable] [PULL for-2.4 3/7] rtl8139: skip offload on short Ethernet/IP header (CVE-2015-5165), Stefan Hajnoczi, 2015/08/03
- [Qemu-stable] [PULL for-2.4 2/7] rtl8139: drop tautologous if (ip) {...} statement (CVE-2015-5165), Stefan Hajnoczi, 2015/08/03
- [Qemu-stable] [PULL for-2.4 7/7] rtl8139: check TCP Data Offset field (CVE-2015-5165), Stefan Hajnoczi, 2015/08/03
- Re: [Qemu-stable] [PULL for-2.4 0/7] Rtl8139 cplus tx input validation patches,
Peter Maydell <=