diff options
author | Sergey Bugaev <bugaevc@serenityos.org> | 2020-05-31 21:56:17 +0300 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2020-05-31 21:38:50 +0200 |
commit | a77405665f4005aae834dc9fe0fc715a843296b5 (patch) | |
tree | eff8602cdbab3ad2e82682ffd99c874442dc3ac0 /Kernel/Multiboot.h | |
parent | c3db694d9b6423047cdd711dee996edc2e52ee88 (diff) | |
download | serenity-a77405665f4005aae834dc9fe0fc715a843296b5.zip |
Kernel: Fix overflow in Process::validate_{read,write}_typed()
Userspace could pass us a large count to overflow the check. I'm not enough of a
haxx0r to write an actual exploit though.
Diffstat (limited to 'Kernel/Multiboot.h')
0 files changed, 0 insertions, 0 deletions