Files
android_kernel_xiaomi_sm8450/arch/x86/include/asm
Dan Carpenter 42d8644bd7 xen: Prevent buffer overflow in privcmd ioctl
The "call" variable comes from the user in privcmd_ioctl_hypercall().
It's an offset into the hypercall_page[] which has (PAGE_SIZE / 32)
elements.  We need to put an upper bound on it to prevent an out of
bounds access.

Cc: stable@vger.kernel.org
Fixes: 1246ae0bb9 ("xen: add variable hypercall caller")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
2019-04-05 08:42:45 +02:00
..
2019-02-11 14:28:56 +01:00
2019-01-04 13:13:46 -08:00
2018-12-03 10:49:13 +01:00
2018-03-20 10:01:57 +01:00
2018-08-15 13:44:10 -07:00
2017-12-22 20:13:04 +01:00
2018-10-31 08:54:12 -07:00
2017-12-22 20:13:01 +01:00
2019-03-06 09:25:41 +01:00
2019-01-16 12:43:08 +01:00
2017-07-26 13:18:20 +02:00
2018-10-14 11:11:22 +02:00
2018-07-20 01:11:45 +02:00
2018-11-04 00:54:34 +01:00
2017-11-15 18:21:05 -08:00
2018-03-20 10:01:57 +01:00
2017-11-15 18:21:04 -08:00