]> xenbits.xensource.com Git - xen.git/commit
memop: limit guest specified extent order
authorJan Beulich <jbeulich@suse.com>
Tue, 4 Dec 2012 18:50:03 +0000 (18:50 +0000)
committerJan Beulich <jbeulich@suse.com>
Tue, 4 Dec 2012 18:50:03 +0000 (18:50 +0000)
commit44dbb797f043cd5ab084726641aeb1d178d18cd0
treef36c580d7ee2a551271ead8916d82aaa120b3077
parentb535076955fbe0a54b794959eafc9b918adb3629
memop: limit guest specified extent order

Allowing unbounded order values here causes almost unbounded loops
and/or partially incomplete requests, particularly in PoD code.

The added range checks in populate_physmap(), decrease_reservation(),
and the "in" one in memory_exchange() architecturally all could use
PADDR_BITS - PAGE_SHIFT, and are being artificially constrained to
MAX_ORDER.

This is XSA-31 / CVE-2012-5515.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Tim Deegan <tim@xen.org>
Acked-by: Ian Jackson <ian.jackson@eu.citrix.com>
Committed-by: Ian Jackson <ian.jackson.citrix.com>
xen/common/memory.c