android_kernel_msm-6.1_noth.../drivers/virt
Hrishabh Rajput 73e449abf4 gunyah: gh_rm_iface: Fix possible gh_vm_table out-of-bounds access
gh_vm_table is an array of size GH_VM_MAX. With present index bound
checks, it is possible to access the array with index GH_VM_MAX. This
will lead to out-of-bounds access since the valid index should range
between 0 and GH_VM_MAX-1.

Change-Id: I1ce7f1bb06f4528d03413ceb86625a0e3ea1d3f1
Signed-off-by: Hrishabh Rajput <quic_hrishabh@quicinc.com>
2024-10-15 14:16:45 +05:30
..
acrn
coco virt: sevguest: Fix passing a stack buffer as a scatterlist target 2023-11-20 11:52:13 +01:00
geniezone FROMLIST: virt: geniezone: Add memory relinquish support 2023-11-27 19:03:01 +00:00
gunyah gunyah: gh_rm_iface: Fix possible gh_vm_table out-of-bounds access 2024-10-15 14:16:45 +05:30
nitro_enclaves
vboxguest
fsl_hypervisor.c
Kconfig Merge keystone/android14-6.1-keystone-qcom-release.6.1.25 (506939c) into 2023-10-16 20:01:20 -07:00
Makefile
vmgenid.c