Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
xen: Prevent buffer overflow in privcmd ioctl
The "call" variable comes from the user in privcmd_ioctl_hypercall(). It's an offset into the hypercall_page[] which has (PAGE_SIZE / 32) elements. We need to put an upper bound on it to prevent an out of bounds access. Cc: [email protected] Fixes: 1246ae0 ("xen: add variable hypercall caller") Signed-off-by: Dan Carpenter <[email protected]> Reviewed-by: Boris Ostrovsky <[email protected]> Signed-off-by: Juergen Gross <[email protected]>
- Loading branch information