summaryrefslogtreecommitdiff
path: root/Kernel/Multiboot.h
diff options
context:
space:
mode:
authorSergey Bugaev <bugaevc@serenityos.org>2020-05-31 21:56:17 +0300
committerAndreas Kling <kling@serenityos.org>2020-05-31 21:38:50 +0200
commita77405665f4005aae834dc9fe0fc715a843296b5 (patch)
treeeff8602cdbab3ad2e82682ffd99c874442dc3ac0 /Kernel/Multiboot.h
parentc3db694d9b6423047cdd711dee996edc2e52ee88 (diff)
downloadserenity-a77405665f4005aae834dc9fe0fc715a843296b5.zip
Kernel: Fix overflow in Process::validate_{read,write}_typed()
Userspace could pass us a large count to overflow the check. I'm not enough of a haxx0r to write an actual exploit though.
Diffstat (limited to 'Kernel/Multiboot.h')
0 files changed, 0 insertions, 0 deletions