Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 29 Mar 2017 23:16:15 +0100
From: Michael Young <>
To: " security team" <>
CC: <>, <>,
        <>, <>
Subject: Re: [Xen-devel] Xen Security Advisory 206 - xenstore denial of
 service via repeated update

On Wed, 29 Mar 2017, security team wrote:

> Hash: SHA1
>                    Xen Security Advisory XSA-206
>                              version 9
>            xenstore denial of service via repeated update

I am seeing a build failure from these patches when using gcc 7. The 
problem is with
because in tools/xenstore/xenstored_domain.c the patch adds the boolean 
wrl_delay_logged to the structure "domain" but later it tries to increment 
it, resulting in the error 
xenstored_domain.c: In function 'wrl_apply_debit_actual':
xenstored_domain.c:949:32: error: increment of a boolean expression 
    if (!domain->wrl_delay_logged++) {

 	Michael Young

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ