[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen Security Advisory 206 - xenstore denial of service via repeated update



On Wed, 29 Mar 2017, Xen.org security team wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                   Xen Security Advisory XSA-206
                             version 9

           xenstore denial of service via repeated update

I am seeing a build failure from these patches when using gcc 7. The problem is with xsa206-4.80002-xenstored-Log-when-the-write-transaction-rate-limit-.patch because in tools/xenstore/xenstored_domain.c the patch adds the boolean wrl_delay_logged to the structure "domain" but later it tries to increment it, resulting in the error xenstored_domain.c: In function 'wrl_apply_debit_actual': xenstored_domain.c:949:32: error: increment of a boolean expression [-Werror=bool-operation]
   if (!domain->wrl_delay_logged++) {

        Michael Young

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.