diff options
author | Ian Campbell <ian.campbell@citrix.com> | 2012-09-11 14:06:43 +0200 |
---|---|---|
committer | Ian Campbell <ian.campbell@citrix.com> | 2012-09-11 14:06:43 +0200 |
commit | f14fc87af896228782ab5eaf174ce7eb27c0c4ca (patch) | |
tree | 1629dcb20e5f5b0a8af4a27dacbee48efc33f8ee /tools/debugger/xenitp/dis-asm.h | |
parent | 60172eff1eacf9fff67ee80857f8735a3664c831 (diff) | |
download | xen-f14fc87af896228782ab5eaf174ce7eb27c0c4ca.tar.gz xen-f14fc87af896228782ab5eaf174ce7eb27c0c4ca.tar.bz2 xen-f14fc87af896228782ab5eaf174ce7eb27c0c4ca.zip |
tmem: consistently make pool_id a uint32_t
Treating it as an int could allow a malicious guest to provide a
negative pool_Id, by passing the MAX_POOLS_PER_DOMAIN limit check and
allowing access to the negative offsets of the pool array.
This is part of XSA-15 / CVE-2012-3497.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Committed-by: Jan Beulich <jbeulich@suse.com>
Diffstat (limited to 'tools/debugger/xenitp/dis-asm.h')
0 files changed, 0 insertions, 0 deletions