aboutsummaryrefslogtreecommitdiff
path: root/util/coroutine-sigaltstack.c
diff options
context:
space:
mode:
authorYuval Shaia <yuval.shaia.ml@gmail.com>2022-04-03 12:52:34 +0300
committerLaurent Vivier <laurent@vivier.eu>2023-01-16 18:49:38 +0100
commit31c4b6fb0293e359f9ef8a61892667e76eea4c99 (patch)
tree166238b28d80f3fd481719f84364710830f766f3 /util/coroutine-sigaltstack.c
parentdaa500cab6a4f8fdaa1a0689a5d39a6b67213801 (diff)
downloadqemu-31c4b6fb0293e359f9ef8a61892667e76eea4c99.zip
qemu-31c4b6fb0293e359f9ef8a61892667e76eea4c99.tar.gz
qemu-31c4b6fb0293e359f9ef8a61892667e76eea4c99.tar.bz2
hw/pvrdma: Protect against buggy or malicious guest driver
Guest driver might execute HW commands when shared buffers are not yet allocated. This could happen on purpose (malicious guest) or because of some other guest/host address mapping error. We need to protect againts such case. Fixes: CVE-2022-1050 Reported-by: Raven <wxhusst@gmail.com> Signed-off-by: Yuval Shaia <yuval.shaia.ml@gmail.com> Message-Id: <20220403095234.2210-1-yuval.shaia.ml@gmail.com> Signed-off-by: Laurent Vivier <laurent@vivier.eu>
Diffstat (limited to 'util/coroutine-sigaltstack.c')
0 files changed, 0 insertions, 0 deletions