summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/rangehttpserver
diff options
context:
space:
mode:
authorFernando Rodrigues <alpha@sigmasquadron.net>2025-10-21 22:57:19 +1100
committerFernando Rodrigues <alpha@sigmasquadron.net>2025-10-22 00:40:59 +1100
commit901ddad0838f69134e863579d140b2d0d28db46e (patch)
treee895a13bc14defb690852e6c11f9040a318a1ccc /pkgs/development/python-modules/rangehttpserver
parente5167cef998e9e4980114773d81b6d3e7a4de48e (diff)
xen: patch with XSA-475
Xen Security Advisory #475 x86: Incorrect input sanitisation in Viridian hypercalls Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer. Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions