From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:53008) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1WUWKl-0008Gs-4y for qemu-devel@nongnu.org; Mon, 31 Mar 2014 03:08:45 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1WUWKf-0003qy-0O for qemu-devel@nongnu.org; Mon, 31 Mar 2014 03:08:39 -0400 Received: from mx1.redhat.com ([209.132.183.28]:39600) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1WUWKe-0003qa-EA for qemu-devel@nongnu.org; Mon, 31 Mar 2014 03:08:32 -0400 From: Stefan Hajnoczi Date: Mon, 31 Mar 2014 09:08:09 +0200 Message-Id: <1396249691-29990-1-git-send-email-stefanha@redhat.com> Subject: [Qemu-devel] [PATCH 0/2] ivshmem: validate incoming_posn value from server List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: Cam Macdonell , Stefan Hajnoczi ivshmem can talk to a server over a UNIX domain socket on the host. We should validate inputs from the server to prevent crashes or memory corruption. Stefan Hajnoczi (2): ivshmem: check ivshmem_read() size argument ivshmem: validate incoming_posn value from server hw/misc/ivshmem.c | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) -- 1.9.0