lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 12 Apr 2010 13:28:32 +0300 From: Avi Kivity <avi@...hat.com> To: wzt.wzt@...il.com CC: linux-kernel@...r.kernel.org, mtosatti@...hat.com, kvm@...r.kernel.org Subject: Re: [PATCH] KVM: Enhance the coalesced_mmio_write() parameter to avoid stack buffer overflow On 04/12/2010 04:57 AM, wzt.wzt@...il.com wrote: > coalesced_mmio_write() is not check the len value, if len is negative, > memcpy(ring->coalesced_mmio[ring->last].data, val, len); will cause > stack buffer overflow. > > How can len be negative? It can only be between 1 and 8. -- I have a truly marvellous patch that fixes the bug which this signature is too narrow to contain. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists