Sebastian Krahmer 34bc07c528 ivshmem: Fix potential OOB r/w access
Fix OOB access via malformed incoming_posn parameters
and check that requested memory is actually alloc'ed.

Signed-off-by: Sebastian Krahmer <krahmer@suse.de>
[AF: Rebased, cleanups, avoid fd leak]
Cc: qemu-stable@nongnu.org
Signed-off-by: Andreas Färber <afaerber@suse.de>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2014-10-31 17:02:07 +01:00
2014-09-18 20:02:01 +01:00
2014-10-31 17:02:07 +01:00
2014-09-04 17:39:07 +01:00
2014-09-25 13:34:03 +01:00
2014-10-31 16:36:23 +01:00
2014-09-29 14:55:28 -04:00
2014-08-29 10:46:58 +01:00
2014-06-23 11:12:28 -04:00
2014-10-23 15:34:02 +02:00
2014-09-16 11:04:09 +02:00
2014-10-24 12:19:11 +01:00
2014-09-26 13:37:06 -04:00
2014-09-26 13:37:06 -04:00
2014-10-10 14:07:08 +01:00
2014-09-26 09:34:39 +01:00
2014-10-24 12:19:11 +01:00
2014-09-22 11:39:45 +01:00
2014-09-22 11:39:45 +01:00
2014-10-02 09:58:14 +02:00
2014-10-31 11:29:01 +01:00
2014-08-01 18:30:08 +01:00
2014-07-07 10:37:40 +00:00

Read the documentation in qemu-doc.html or on http://wiki.qemu-project.org

- QEMU team
Description
No description provided
Readme 404 MiB
Languages
C 82.6%
C++ 6.5%
Python 3.4%
Dylan 2.9%
Shell 1.6%
Other 2.8%