aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJan Beulich <jbeulich@suse.com>2013-04-05 09:59:03 +0200
committerJan Beulich <jbeulich@suse.com>2013-04-05 09:59:03 +0200
commit99b9ab0b3e7f0e7e5786116773cb7b746f3fab87 (patch)
treed82851af78da9d81e9e2e26b47ea99779c4b8af0
parentcfc515dabe91e3d6c690c68c6a669d6d77fb7ac4 (diff)
downloadxen-99b9ab0b3e7f0e7e5786116773cb7b746f3fab87.tar.gz
xen-99b9ab0b3e7f0e7e5786116773cb7b746f3fab87.tar.bz2
xen-99b9ab0b3e7f0e7e5786116773cb7b746f3fab87.zip
defer event channel bucket pointer store until after XSM checks
Otherwise a dangling pointer can be left, which would cause subsequent memory corruption as soon as the space got re-allocated for some other purpose. This is CVE-2013-1920 / XSA-47. Reported-by: Wei Liu <wei.liu2@citrix.com> Signed-off-by: Jan Beulich <jbeulich@suse.com> Reviewed-by: Tim Deegan <tim@xen.org>
-rw-r--r--xen/common/event_channel.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index a0f293ff2e..0a6684c6d5 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -140,7 +140,6 @@ static int get_free_port(struct domain *d)
chn = xzalloc_array(struct evtchn, EVTCHNS_PER_BUCKET);
if ( unlikely(chn == NULL) )
return -ENOMEM;
- bucket_from_port(d, port) = chn;
for ( i = 0; i < EVTCHNS_PER_BUCKET; i++ )
{
@@ -153,6 +152,8 @@ static int get_free_port(struct domain *d)
}
}
+ bucket_from_port(d, port) = chn;
+
return port;
}